Bug Root Legacy Binary Script Next- Gen Linux Social Media Exploit Zero- Day IP Tracker Encryption Hacking (as a verb) White Hat Main Frame Brute force Cyber attack Trojan VPN Domain Keylogger Ransom- ware Virus Cyber Gbps Machine Learning Chinese 1337 Spam Unix Dark Web Spoofing Black Hat Penetration Extortion Data Logs End- User Patch Phishing Intelligence Bot Breach Malware AI Nuclear admin Cloud Anonymous Vulnerability Bug Root Legacy Binary Script Next- Gen Linux Social Media Exploit Zero- Day IP Tracker Encryption Hacking (as a verb) White Hat Main Frame Brute force Cyber attack Trojan VPN Domain Keylogger Ransom- ware Virus Cyber Gbps Machine Learning Chinese 1337 Spam Unix Dark Web Spoofing Black Hat Penetration Extortion Data Logs End- User Patch Phishing Intelligence Bot Breach Malware AI Nuclear admin Cloud Anonymous Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bug
Root
Legacy
Binary Script
Next-Gen
Linux
Social Media
Exploit
Zero-Day
IP Tracker
Encryption
Hacking (as a verb)
White Hat
Main Frame
Brute force
Cyber attack
Trojan
VPN
Domain
Keylogger
Ransom-ware
Virus
Cyber
Gbps
Machine Learning
Chinese
1337
Spam
Unix
Dark Web
Spoofing
Black Hat
Penetration
Extortion
Data Logs
End-User
Patch
Phishing
Intelligence
Bot
Breach
Malware
AI
Nuclear
admin
Cloud
Anonymous
Vulnerability