Anonymous AI Spam Virus Bot VPN Root Chinese Black Hat Zero- Day Gbps Machine Learning Linux Malware White Hat Penetration Domain Keylogger Brute force 1337 IP Tracker Phishing Nuclear Binary Script Unix Legacy Vulnerability Breach Patch End- User Dark Web Main Frame Hacking (as a verb) Data Logs Social Media Bug Ransom- ware Spoofing Next- Gen Cloud Trojan Encryption Cyber Exploit admin Extortion Intelligence Cyber attack Anonymous AI Spam Virus Bot VPN Root Chinese Black Hat Zero- Day Gbps Machine Learning Linux Malware White Hat Penetration Domain Keylogger Brute force 1337 IP Tracker Phishing Nuclear Binary Script Unix Legacy Vulnerability Breach Patch End- User Dark Web Main Frame Hacking (as a verb) Data Logs Social Media Bug Ransom- ware Spoofing Next- Gen Cloud Trojan Encryption Cyber Exploit admin Extortion Intelligence Cyber attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Anonymous
AI
Spam
Virus
Bot
VPN
Root
Chinese
Black Hat
Zero-Day
Gbps
Machine Learning
Linux
Malware
White Hat
Penetration
Domain
Keylogger
Brute force
1337
IP Tracker
Phishing
Nuclear
Binary Script
Unix
Legacy
Vulnerability
Breach
Patch
End-User
Dark Web
Main Frame
Hacking (as a verb)
Data Logs
Social Media
Bug
Ransom-ware
Spoofing
Next-Gen
Cloud
Trojan
Encryption
Cyber
Exploit
admin
Extortion
Intelligence
Cyber attack