News
Hacking a CTF in two minutes. Once Elliot wakes from his post gunshot coma (six days later), he immediately picks up where he left off … trying to stop the Stage 2 hack, ...
Hacking conferences often feature a Capture the Flag, or CTF event. Typically, this is a software hacking challenge that involves breaking into targets which have been set up for the event, and cap… ...
Capture the flag (CTF) and other types of hacking competitions are generally hosted on closed networks or “cyber ranges”—dedicated infrastructure set up for the contest so that participants ...
Google fixed a zero-day in Chrome that was found by an Apple employee, according to comments in the official bug report.While the bug itself is not newsworthy, the circumstances of how this bug ...
There were a number of really good talks at all levels of expertise, a couple of "Capture the Flag" (CTF) hacking challenges, and all the other typical hallmarks of a well-run hacker conference.
At even vaguely infosec-related conferences, CTFs are a staple. For KernelCon 2021, [Tyler Rosonke] resolved to create a challenge breaking the traditions, entertaining and teaching people in a dif… ...
Carnegie Mellon University's hacking team, Plaid Parliament of Pwning (PPP), won its third straight DEF CON Capture-the-Flag title, earning its eighth victory in the past 12 years.
And they say Apple is mean with its bug bounty rewards program. During a "Capture the Flag" (CTF hacking contest in March, an Apple employee spotted a previously unknown bug in Google Chrome ...
Through its bug bounties and Capture the Flag (CTF) hacking competitions, it has encouraged everyone to take a crack at its systems and specific challenges. But running that CTF virtual system is ...
CTF hacking tournaments have long been a staple at Defcon, with teams working against each other both to protect their systems from attack and to penetrate the systems of opposing teams.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results