1337VulnerabilityTrojanBlackHatadminExtortionAnonymousBruteforceSocialMediaCyberattackKeyloggerCloudGbpsIntelligenceCyberVPNRootBotIPTrackerUnixDarkWebChineseBreachPatchExploitLegacyHacking(as averb)WhiteHatZero-DayRansom-wareMainFrameSpoofingNuclearPenetrationLinuxMalwareEnd-UserDataLogsAINext-GenDomainSpamBinaryScriptPhishingBugEncryptionVirusMachineLearning1337VulnerabilityTrojanBlackHatadminExtortionAnonymousBruteforceSocialMediaCyberattackKeyloggerCloudGbpsIntelligenceCyberVPNRootBotIPTrackerUnixDarkWebChineseBreachPatchExploitLegacyHacking(as averb)WhiteHatZero-DayRansom-wareMainFrameSpoofingNuclearPenetrationLinuxMalwareEnd-UserDataLogsAINext-GenDomainSpamBinaryScriptPhishingBugEncryptionVirusMachineLearning

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. 1337
  2. Vulnerability
  3. Trojan
  4. Black Hat
  5. admin
  6. Extortion
  7. Anonymous
  8. Brute force
  9. Social Media
  10. Cyber attack
  11. Keylogger
  12. Cloud
  13. Gbps
  14. Intelligence
  15. Cyber
  16. VPN
  17. Root
  18. Bot
  19. IP Tracker
  20. Unix
  21. Dark Web
  22. Chinese
  23. Breach
  24. Patch
  25. Exploit
  26. Legacy
  27. Hacking (as a verb)
  28. White Hat
  29. Zero-Day
  30. Ransom-ware
  31. Main Frame
  32. Spoofing
  33. Nuclear
  34. Penetration
  35. Linux
  36. Malware
  37. End-User
  38. Data Logs
  39. AI
  40. Next-Gen
  41. Domain
  42. Spam
  43. Binary Script
  44. Phishing
  45. Bug
  46. Encryption
  47. Virus
  48. Machine Learning