BlackHatBotSpoofingBruteforceCyberattackSocialMediaLinuxMalwareadminNext-GenRootHacking(as averb)DomainWhiteHatDataLogsVPNZero-DayBugKeyloggerVulnerabilityPatchTrojanPhishingIPTrackerMachineLearningExploitBreach1337SpamNuclearDarkWebIntelligenceLegacyVirusCloudCyberGbpsAnonymousEnd-UserUnixBinaryScriptExtortionChineseRansom-wareEncryptionAIMainFramePenetrationBlackHatBotSpoofingBruteforceCyberattackSocialMediaLinuxMalwareadminNext-GenRootHacking(as averb)DomainWhiteHatDataLogsVPNZero-DayBugKeyloggerVulnerabilityPatchTrojanPhishingIPTrackerMachineLearningExploitBreach1337SpamNuclearDarkWebIntelligenceLegacyVirusCloudCyberGbpsAnonymousEnd-UserUnixBinaryScriptExtortionChineseRansom-wareEncryptionAIMainFramePenetration

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Black Hat
  2. Bot
  3. Spoofing
  4. Brute force
  5. Cyber attack
  6. Social Media
  7. Linux
  8. Malware
  9. admin
  10. Next-Gen
  11. Root
  12. Hacking (as a verb)
  13. Domain
  14. White Hat
  15. Data Logs
  16. VPN
  17. Zero-Day
  18. Bug
  19. Keylogger
  20. Vulnerability
  21. Patch
  22. Trojan
  23. Phishing
  24. IP Tracker
  25. Machine Learning
  26. Exploit
  27. Breach
  28. 1337
  29. Spam
  30. Nuclear
  31. Dark Web
  32. Intelligence
  33. Legacy
  34. Virus
  35. Cloud
  36. Cyber
  37. Gbps
  38. Anonymous
  39. End-User
  40. Unix
  41. Binary Script
  42. Extortion
  43. Chinese
  44. Ransom-ware
  45. Encryption
  46. AI
  47. Main Frame
  48. Penetration