Hacking(as averb)PenetrationSpamBruteforceChineseExtortionVulnerabilityCyberattackSpoofingDarkWebMainFrameGbpsIPTrackerRootBlackHatBreachEnd-UserRansom-wareWhiteHatUnixLegacyPatchNext-GenBotVirusDomainMalwareAIadminExploitMachineLearningVPNNuclear1337BinaryScriptZero-DayAnonymousLinuxKeyloggerPhishingDataLogsEncryptionIntelligenceCloudTrojanSocialMediaCyberBugHacking(as averb)PenetrationSpamBruteforceChineseExtortionVulnerabilityCyberattackSpoofingDarkWebMainFrameGbpsIPTrackerRootBlackHatBreachEnd-UserRansom-wareWhiteHatUnixLegacyPatchNext-GenBotVirusDomainMalwareAIadminExploitMachineLearningVPNNuclear1337BinaryScriptZero-DayAnonymousLinuxKeyloggerPhishingDataLogsEncryptionIntelligenceCloudTrojanSocialMediaCyberBug

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Hacking (as a verb)
  2. Penetration
  3. Spam
  4. Brute force
  5. Chinese
  6. Extortion
  7. Vulnerability
  8. Cyber attack
  9. Spoofing
  10. Dark Web
  11. Main Frame
  12. Gbps
  13. IP Tracker
  14. Root
  15. Black Hat
  16. Breach
  17. End-User
  18. Ransom-ware
  19. White Hat
  20. Unix
  21. Legacy
  22. Patch
  23. Next-Gen
  24. Bot
  25. Virus
  26. Domain
  27. Malware
  28. AI
  29. admin
  30. Exploit
  31. Machine Learning
  32. VPN
  33. Nuclear
  34. 1337
  35. Binary Script
  36. Zero-Day
  37. Anonymous
  38. Linux
  39. Keylogger
  40. Phishing
  41. Data Logs
  42. Encryption
  43. Intelligence
  44. Cloud
  45. Trojan
  46. Social Media
  47. Cyber
  48. Bug