Hacking (as a verb) Ransom- ware Spam Bot Dark Web Intelligence Keylogger AI Cloud Linux Nuclear Unix Anonymous Virus Vulnerability Phishing Encryption Black Hat IP Tracker Social Media Main Frame White Hat Domain VPN admin Binary Script Malware Patch Extortion Machine Learning Trojan Gbps Chinese Exploit Next- Gen Root Zero- Day Brute force Data Logs Breach Spoofing 1337 Legacy Bug End- User Cyber Cyber attack Penetration Hacking (as a verb) Ransom- ware Spam Bot Dark Web Intelligence Keylogger AI Cloud Linux Nuclear Unix Anonymous Virus Vulnerability Phishing Encryption Black Hat IP Tracker Social Media Main Frame White Hat Domain VPN admin Binary Script Malware Patch Extortion Machine Learning Trojan Gbps Chinese Exploit Next- Gen Root Zero- Day Brute force Data Logs Breach Spoofing 1337 Legacy Bug End- User Cyber Cyber attack Penetration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Hacking (as a verb)
Ransom-ware
Spam
Bot
Dark Web
Intelligence
Keylogger
AI
Cloud
Linux
Nuclear
Unix
Anonymous
Virus
Vulnerability
Phishing
Encryption
Black Hat
IP Tracker
Social Media
Main Frame
White Hat
Domain
VPN
admin
Binary Script
Malware
Patch
Extortion
Machine Learning
Trojan
Gbps
Chinese
Exploit
Next-Gen
Root
Zero-Day
Brute force
Data Logs
Breach
Spoofing
1337
Legacy
Bug
End-User
Cyber
Cyber attack
Penetration