PhishingHacking(as averb)DataLogs1337BotBreachExploitBugKeyloggerEnd-UserAIIPTrackerBlackHatCyberCyberattackAnonymousNuclearMalwareMainFrameSpoofingBruteforceVPNDarkWebTrojanVulnerabilityChineseIntelligenceZero-DayBinaryScriptNext-GenUnixWhiteHatPatchSocialMediaPenetrationEncryptionadminVirusRootExtortionSpamCloudGbpsLinuxMachineLearningDomainLegacyRansom-warePhishingHacking(as averb)DataLogs1337BotBreachExploitBugKeyloggerEnd-UserAIIPTrackerBlackHatCyberCyberattackAnonymousNuclearMalwareMainFrameSpoofingBruteforceVPNDarkWebTrojanVulnerabilityChineseIntelligenceZero-DayBinaryScriptNext-GenUnixWhiteHatPatchSocialMediaPenetrationEncryptionadminVirusRootExtortionSpamCloudGbpsLinuxMachineLearningDomainLegacyRansom-ware

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Phishing
  2. Hacking (as a verb)
  3. Data Logs
  4. 1337
  5. Bot
  6. Breach
  7. Exploit
  8. Bug
  9. Keylogger
  10. End-User
  11. AI
  12. IP Tracker
  13. Black Hat
  14. Cyber
  15. Cyber attack
  16. Anonymous
  17. Nuclear
  18. Malware
  19. Main Frame
  20. Spoofing
  21. Brute force
  22. VPN
  23. Dark Web
  24. Trojan
  25. Vulnerability
  26. Chinese
  27. Intelligence
  28. Zero-Day
  29. Binary Script
  30. Next-Gen
  31. Unix
  32. White Hat
  33. Patch
  34. Social Media
  35. Penetration
  36. Encryption
  37. admin
  38. Virus
  39. Root
  40. Extortion
  41. Spam
  42. Cloud
  43. Gbps
  44. Linux
  45. Machine Learning
  46. Domain
  47. Legacy
  48. Ransom-ware