Bug Machine Learning Root Chinese Phishing Anonymous Breach Extortion Main Frame End- User Zero- Day Cyber Next- Gen Binary Script Gbps Exploit Trojan VPN Patch AI Hacking (as a verb) Cloud Black Hat Vulnerability Social Media Spoofing Nuclear Intelligence Cyber attack Legacy White Hat Spam Dark Web Malware IP Tracker Penetration 1337 Ransom- ware Data Logs Encryption Virus Keylogger Bot Domain Brute force Linux admin Unix Bug Machine Learning Root Chinese Phishing Anonymous Breach Extortion Main Frame End- User Zero- Day Cyber Next- Gen Binary Script Gbps Exploit Trojan VPN Patch AI Hacking (as a verb) Cloud Black Hat Vulnerability Social Media Spoofing Nuclear Intelligence Cyber attack Legacy White Hat Spam Dark Web Malware IP Tracker Penetration 1337 Ransom- ware Data Logs Encryption Virus Keylogger Bot Domain Brute force Linux admin Unix
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bug
Machine Learning
Root
Chinese
Phishing
Anonymous
Breach
Extortion
Main Frame
End-User
Zero-Day
Cyber
Next-Gen
Binary Script
Gbps
Exploit
Trojan
VPN
Patch
AI
Hacking (as a verb)
Cloud
Black Hat
Vulnerability
Social Media
Spoofing
Nuclear
Intelligence
Cyber attack
Legacy
White Hat
Spam
Dark Web
Malware
IP Tracker
Penetration
1337
Ransom-ware
Data Logs
Encryption
Virus
Keylogger
Bot
Domain
Brute force
Linux
admin
Unix