Introducing The Cloud Hunting Games CTF: Test Your Cloud Incident Response Skills

Wiz is excited to announce “The Cloud Hunting Games”, a new hands-on Capture the Flag (CTF) challenge designed to test your cloud incident response skills.

1 分で読めます

Can you save ExfilCola’s secret recipe?

What happens when a startup with a promising secret soda formula gets hit with a data extortion threat?

That’s the scenario behind our latest cloud security Capture the Flag (CTF) challenge: The ExfilCola Incident. Players step into the shoes of an incident response expert tasked with investigating a suspicious breach at ExfilCola, a fictional soda startup with one very real problem: someone claims to have stolen their secret recipe.

Your mission? Unfold the steps of the attacker, trace them back to the initial access point, and make sure that the secret formula is safe.

Why did we build this challenge?

Cloud threats are evolving fast. Whether it’s data exfiltration, ransomware, or resource hijacking, defenders need hands-on experience with real-world tactics to stay ahead. This CTF is designed to give players a taste of a real-world cloud incident investigation based on common TTPs seen in the wild.

Claim your cloud incident response certificate

All registered participants who complete the challenge will earn a spot on our leaderboard and receive an official certificate to recognize their cloud incident response skills.

Are you ready to stop the leak?

Inspired by real-world cloud attacks, The Cloud Hunting Games CTF challenge gives you a hands-on way to sharpen your incident response skills.

Start Investigation

The Cloud Hunting Games CTF was designed by the expert Wiz Research team. Questions or need assistance? Contact us at research@wiz.io or on X @wizresearch/@nirohfeld/@DerorTc/@AbbyMCH

タグ
#Security

続きを読む

パーソナライズされたデモを見る

Wiz の動作を確認する準備はできましたか?

“私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。”
デビッド・エストリックCISO (最高情報責任者)
“Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます”
アダム・フレッチャーチーフ・セキュリティ・オフィサー
“Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。”
グレッグ・ポニャトフスキ脅威および脆弱性管理責任者