MalwareCyberattackBreachDarkWebAIGbpsKeyloggerZero-DayDataLogsPhishingWhiteHatLegacyBlackHatCyberMachineLearningEncryptionExtortionRootUnixadminNuclearPenetrationSocialMediaCloudMainFrameVirusRansom-wareIPTrackerHacking(as averb)PatchSpamSpoofingBruteforce1337End-UserIntelligenceDomainExploitBotLinuxBugVulnerabilityVPNTrojanChineseAnonymousNext-GenBinaryScriptMalwareCyberattackBreachDarkWebAIGbpsKeyloggerZero-DayDataLogsPhishingWhiteHatLegacyBlackHatCyberMachineLearningEncryptionExtortionRootUnixadminNuclearPenetrationSocialMediaCloudMainFrameVirusRansom-wareIPTrackerHacking(as averb)PatchSpamSpoofingBruteforce1337End-UserIntelligenceDomainExploitBotLinuxBugVulnerabilityVPNTrojanChineseAnonymousNext-GenBinaryScript

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Malware
  2. Cyber attack
  3. Breach
  4. Dark Web
  5. AI
  6. Gbps
  7. Keylogger
  8. Zero-Day
  9. Data Logs
  10. Phishing
  11. White Hat
  12. Legacy
  13. Black Hat
  14. Cyber
  15. Machine Learning
  16. Encryption
  17. Extortion
  18. Root
  19. Unix
  20. admin
  21. Nuclear
  22. Penetration
  23. Social Media
  24. Cloud
  25. Main Frame
  26. Virus
  27. Ransom-ware
  28. IP Tracker
  29. Hacking (as a verb)
  30. Patch
  31. Spam
  32. Spoofing
  33. Brute force
  34. 1337
  35. End-User
  36. Intelligence
  37. Domain
  38. Exploit
  39. Bot
  40. Linux
  41. Bug
  42. Vulnerability
  43. VPN
  44. Trojan
  45. Chinese
  46. Anonymous
  47. Next-Gen
  48. Binary Script