Exploit Dark Web Encryption Bug AI Extortion Social Media Spam Zero- Day Breach Cyber attack admin Bot Brute force Virus Keylogger Phishing Anonymous Cloud Legacy VPN Ransom- ware Root Patch Data Logs End- User Gbps Next- Gen Penetration Linux Cyber Trojan Malware Chinese Domain Intelligence Hacking (as a verb) IP Tracker 1337 Unix Black Hat Nuclear Main Frame Binary Script Spoofing Vulnerability Machine Learning White Hat Exploit Dark Web Encryption Bug AI Extortion Social Media Spam Zero- Day Breach Cyber attack admin Bot Brute force Virus Keylogger Phishing Anonymous Cloud Legacy VPN Ransom- ware Root Patch Data Logs End- User Gbps Next- Gen Penetration Linux Cyber Trojan Malware Chinese Domain Intelligence Hacking (as a verb) IP Tracker 1337 Unix Black Hat Nuclear Main Frame Binary Script Spoofing Vulnerability Machine Learning White Hat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Exploit
Dark Web
Encryption
Bug
AI
Extortion
Social Media
Spam
Zero-Day
Breach
Cyber attack
admin
Bot
Brute force
Virus
Keylogger
Phishing
Anonymous
Cloud
Legacy
VPN
Ransom-ware
Root
Patch
Data Logs
End-User
Gbps
Next-Gen
Penetration
Linux
Cyber
Trojan
Malware
Chinese
Domain
Intelligence
Hacking (as a verb)
IP Tracker
1337
Unix
Black Hat
Nuclear
Main Frame
Binary Script
Spoofing
Vulnerability
Machine Learning
White Hat