Introducing The Cloud Hunting Games CTF: Test Your Cloud Incident Response Skills

Wiz is excited to announce “The Cloud Hunting Games”, a new hands-on Capture the Flag (CTF) challenge designed to test your cloud incident response skills.

Can you save ExfilCola’s secret recipe?

What happens when a startup with a promising secret soda formula gets hit with a data extortion threat?

That’s the scenario behind our latest cloud security Capture the Flag (CTF) challenge: The ExfilCola Incident. Players step into the shoes of an incident response expert tasked with investigating a suspicious breach at ExfilCola, a fictional soda startup with one very real problem: someone claims to have stolen their secret recipe.

Your mission? Unfold the steps of the attacker, trace them back to the initial access point, and make sure that the secret formula is safe.

Why did we build this challenge?

Cloud threats are evolving fast. Whether it’s data exfiltration, ransomware, or resource hijacking, defenders need hands-on experience with real-world tactics to stay ahead. This CTF is designed to give players a taste of a real-world cloud incident investigation based on common TTPs seen in the wild.

Claim your cloud incident response certificate

All registered participants who complete the challenge will earn a spot on our leaderboard and receive an official certificate to recognize their cloud incident response skills.

Are you ready to stop the leak?

Inspired by real-world cloud attacks, The Cloud Hunting Games CTF challenge gives you a hands-on way to sharpen your incident response skills.

Start Investigation

The Cloud Hunting Games CTF was designed by the expert Wiz Research team. Questions or need assistance? Contact us at research@wiz.io or on X @wizresearch/@nirohfeld/@DerorTc/@AbbyMCH

태그
#Security

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자