CTF is a Capture The Flag (CTF) style of cyber security competition. Use the links below to explore our archive of practice challenges.
While investigating a phishing attempt, you stumble upon a suspicious
While monitoring communications, you found a suspicious note. It looks
Security team has noticed suspicious social media chatter about an
You received an intercepted audio recording that seems ordinary at