ExploitDarkWebEncryptionBugAIExtortionSocialMediaSpamZero-DayBreachCyberattackadminBotBruteforceVirusKeyloggerPhishingAnonymousCloudLegacyVPNRansom-wareRootPatchDataLogsEnd-UserGbpsNext-GenPenetrationLinuxCyberTrojanMalwareChineseDomainIntelligenceHacking(as averb)IPTracker1337UnixBlackHatNuclearMainFrameBinaryScriptSpoofingVulnerabilityMachineLearningWhiteHatExploitDarkWebEncryptionBugAIExtortionSocialMediaSpamZero-DayBreachCyberattackadminBotBruteforceVirusKeyloggerPhishingAnonymousCloudLegacyVPNRansom-wareRootPatchDataLogsEnd-UserGbpsNext-GenPenetrationLinuxCyberTrojanMalwareChineseDomainIntelligenceHacking(as averb)IPTracker1337UnixBlackHatNuclearMainFrameBinaryScriptSpoofingVulnerabilityMachineLearningWhiteHat

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Exploit
  2. Dark Web
  3. Encryption
  4. Bug
  5. AI
  6. Extortion
  7. Social Media
  8. Spam
  9. Zero-Day
  10. Breach
  11. Cyber attack
  12. admin
  13. Bot
  14. Brute force
  15. Virus
  16. Keylogger
  17. Phishing
  18. Anonymous
  19. Cloud
  20. Legacy
  21. VPN
  22. Ransom-ware
  23. Root
  24. Patch
  25. Data Logs
  26. End-User
  27. Gbps
  28. Next-Gen
  29. Penetration
  30. Linux
  31. Cyber
  32. Trojan
  33. Malware
  34. Chinese
  35. Domain
  36. Intelligence
  37. Hacking (as a verb)
  38. IP Tracker
  39. 1337
  40. Unix
  41. Black Hat
  42. Nuclear
  43. Main Frame
  44. Binary Script
  45. Spoofing
  46. Vulnerability
  47. Machine Learning
  48. White Hat