CyberBinaryScriptEnd-UserNext-GenMachineLearningBreachRansom-wareBotVPN1337adminNuclearChineseSocialMediaLegacySpoofingZero-DayCyberattackMainFrameSpamPhishingAIBruteforceVulnerabilityHacking(as averb)RootDarkWebIntelligenceDataLogsTrojanGbpsUnixBugExploitEncryptionVirusMalwareAnonymousBlackHatPenetrationExtortionKeyloggerWhiteHatIPTrackerLinuxDomainCloudPatchCyberBinaryScriptEnd-UserNext-GenMachineLearningBreachRansom-wareBotVPN1337adminNuclearChineseSocialMediaLegacySpoofingZero-DayCyberattackMainFrameSpamPhishingAIBruteforceVulnerabilityHacking(as averb)RootDarkWebIntelligenceDataLogsTrojanGbpsUnixBugExploitEncryptionVirusMalwareAnonymousBlackHatPenetrationExtortionKeyloggerWhiteHatIPTrackerLinuxDomainCloudPatch

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Cyber
  2. Binary Script
  3. End-User
  4. Next-Gen
  5. Machine Learning
  6. Breach
  7. Ransom-ware
  8. Bot
  9. VPN
  10. 1337
  11. admin
  12. Nuclear
  13. Chinese
  14. Social Media
  15. Legacy
  16. Spoofing
  17. Zero-Day
  18. Cyber attack
  19. Main Frame
  20. Spam
  21. Phishing
  22. AI
  23. Brute force
  24. Vulnerability
  25. Hacking (as a verb)
  26. Root
  27. Dark Web
  28. Intelligence
  29. Data Logs
  30. Trojan
  31. Gbps
  32. Unix
  33. Bug
  34. Exploit
  35. Encryption
  36. Virus
  37. Malware
  38. Anonymous
  39. Black Hat
  40. Penetration
  41. Extortion
  42. Keylogger
  43. White Hat
  44. IP Tracker
  45. Linux
  46. Domain
  47. Cloud
  48. Patch