1337 Vulnerability Trojan Black Hat admin Extortion Anonymous Brute force Social Media Cyber attack Keylogger Cloud Gbps Intelligence Cyber VPN Root Bot IP Tracker Unix Dark Web Chinese Breach Patch Exploit Legacy Hacking (as a verb) White Hat Zero- Day Ransom- ware Main Frame Spoofing Nuclear Penetration Linux Malware End- User Data Logs AI Next- Gen Domain Spam Binary Script Phishing Bug Encryption Virus Machine Learning 1337 Vulnerability Trojan Black Hat admin Extortion Anonymous Brute force Social Media Cyber attack Keylogger Cloud Gbps Intelligence Cyber VPN Root Bot IP Tracker Unix Dark Web Chinese Breach Patch Exploit Legacy Hacking (as a verb) White Hat Zero- Day Ransom- ware Main Frame Spoofing Nuclear Penetration Linux Malware End- User Data Logs AI Next- Gen Domain Spam Binary Script Phishing Bug Encryption Virus Machine Learning
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1337
Vulnerability
Trojan
Black Hat
admin
Extortion
Anonymous
Brute force
Social Media
Cyber attack
Keylogger
Cloud
Gbps
Intelligence
Cyber
VPN
Root
Bot
IP Tracker
Unix
Dark Web
Chinese
Breach
Patch
Exploit
Legacy
Hacking (as a verb)
White Hat
Zero-Day
Ransom-ware
Main Frame
Spoofing
Nuclear
Penetration
Linux
Malware
End-User
Data Logs
AI
Next-Gen
Domain
Spam
Binary Script
Phishing
Bug
Encryption
Virus
Machine Learning