Social Media AI Intelligence Exploit Chinese Trojan VPN Breach Nuclear Zero- Day IP Tracker Main Frame White Hat Brute force Patch Cyber attack Root Data Logs Keylogger Phishing Malware Spam End- User Cloud Unix Linux Black Hat Extortion Domain Encryption Hacking (as a verb) Ransom- ware Penetration Next- Gen Spoofing admin Bot Legacy 1337 Vulnerability Gbps Machine Learning Bug Virus Anonymous Dark Web Cyber Binary Script Social Media AI Intelligence Exploit Chinese Trojan VPN Breach Nuclear Zero- Day IP Tracker Main Frame White Hat Brute force Patch Cyber attack Root Data Logs Keylogger Phishing Malware Spam End- User Cloud Unix Linux Black Hat Extortion Domain Encryption Hacking (as a verb) Ransom- ware Penetration Next- Gen Spoofing admin Bot Legacy 1337 Vulnerability Gbps Machine Learning Bug Virus Anonymous Dark Web Cyber Binary Script
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Social Media
AI
Intelligence
Exploit
Chinese
Trojan
VPN
Breach
Nuclear
Zero-Day
IP Tracker
Main Frame
White Hat
Brute force
Patch
Cyber attack
Root
Data Logs
Keylogger
Phishing
Malware
Spam
End-User
Cloud
Unix
Linux
Black Hat
Extortion
Domain
Encryption
Hacking (as a verb)
Ransom-ware
Penetration
Next-Gen
Spoofing
admin
Bot
Legacy
1337
Vulnerability
Gbps
Machine Learning
Bug
Virus
Anonymous
Dark Web
Cyber
Binary Script