Hacking(as averb)Ransom-wareSpamBotDarkWebIntelligenceKeyloggerAICloudLinuxNuclearUnixAnonymousVirusVulnerabilityPhishingEncryptionBlackHatIPTrackerSocialMediaMainFrameWhiteHatDomainVPNadminBinaryScriptMalwarePatchExtortionMachineLearningTrojanGbpsChineseExploitNext-GenRootZero-DayBruteforceDataLogsBreachSpoofing1337LegacyBugEnd-UserCyberCyberattackPenetrationHacking(as averb)Ransom-wareSpamBotDarkWebIntelligenceKeyloggerAICloudLinuxNuclearUnixAnonymousVirusVulnerabilityPhishingEncryptionBlackHatIPTrackerSocialMediaMainFrameWhiteHatDomainVPNadminBinaryScriptMalwarePatchExtortionMachineLearningTrojanGbpsChineseExploitNext-GenRootZero-DayBruteforceDataLogsBreachSpoofing1337LegacyBugEnd-UserCyberCyberattackPenetration

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Hacking (as a verb)
  2. Ransom-ware
  3. Spam
  4. Bot
  5. Dark Web
  6. Intelligence
  7. Keylogger
  8. AI
  9. Cloud
  10. Linux
  11. Nuclear
  12. Unix
  13. Anonymous
  14. Virus
  15. Vulnerability
  16. Phishing
  17. Encryption
  18. Black Hat
  19. IP Tracker
  20. Social Media
  21. Main Frame
  22. White Hat
  23. Domain
  24. VPN
  25. admin
  26. Binary Script
  27. Malware
  28. Patch
  29. Extortion
  30. Machine Learning
  31. Trojan
  32. Gbps
  33. Chinese
  34. Exploit
  35. Next-Gen
  36. Root
  37. Zero-Day
  38. Brute force
  39. Data Logs
  40. Breach
  41. Spoofing
  42. 1337
  43. Legacy
  44. Bug
  45. End-User
  46. Cyber
  47. Cyber attack
  48. Penetration