Malware Cyber attack Breach Dark Web AI Gbps Keylogger Zero- Day Data Logs Phishing White Hat Legacy Black Hat Cyber Machine Learning Encryption Extortion Root Unix admin Nuclear Penetration Social Media Cloud Main Frame Virus Ransom- ware IP Tracker Hacking (as a verb) Patch Spam Spoofing Brute force 1337 End- User Intelligence Domain Exploit Bot Linux Bug Vulnerability VPN Trojan Chinese Anonymous Next- Gen Binary Script Malware Cyber attack Breach Dark Web AI Gbps Keylogger Zero- Day Data Logs Phishing White Hat Legacy Black Hat Cyber Machine Learning Encryption Extortion Root Unix admin Nuclear Penetration Social Media Cloud Main Frame Virus Ransom- ware IP Tracker Hacking (as a verb) Patch Spam Spoofing Brute force 1337 End- User Intelligence Domain Exploit Bot Linux Bug Vulnerability VPN Trojan Chinese Anonymous Next- Gen Binary Script
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malware
Cyber attack
Breach
Dark Web
AI
Gbps
Keylogger
Zero-Day
Data Logs
Phishing
White Hat
Legacy
Black Hat
Cyber
Machine Learning
Encryption
Extortion
Root
Unix
admin
Nuclear
Penetration
Social Media
Cloud
Main Frame
Virus
Ransom-ware
IP Tracker
Hacking (as a verb)
Patch
Spam
Spoofing
Brute force
1337
End-User
Intelligence
Domain
Exploit
Bot
Linux
Bug
Vulnerability
VPN
Trojan
Chinese
Anonymous
Next-Gen
Binary Script