Saturday, July 20, 2024

Cynet Issues Incident Response Challenge 2020 for IR Professionals With $5,000 Prize

Cynet today announced the company’s IR Challenge for incident response professionals.

By participating in this event, Incident Responders challenged to match their skills against colleagues in the first of its kind contest with $5,000 Prize.

Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration across the entire environment.

The first-place winner of the contest will receive a $5,000 prize as the contest qualifies the investigative capabilities of participants against a set of challenges designed by top IR experts.

With the launch of this challenge, Cynet has assembled the top analysts and researchers to build out the challenges in this IR contest and ensure that solving the presented problems will strain the skills of even the most experienced responders.

IR Challenge Main Guideline

The main guideline in the IR Challenge is that the tests reflect real-life scenarios rather than artificial mind drills. In light of that, the team has reviewed a large number of documented investigations to distill a total of 28 patterns, starting from easy and becoming progressively more difficult as the IR professional proceeds.

Incident response (IR) is a methodical approach to orchestrating and managing the response after a cyberattack or other security breach.

The objective is to confidently manage the situation in a way that reduces damage and limits recovery time and costs.

Prominent to this process is the ability to conduct a forensic investigation across the attacked environment in order to form a clear understanding of the incident’s root cause, attack vectors and overall impact.

The challenge also tests for IR investigative strengths of participating individuals, allowing them to measure and sharpen their skill set.

“While Capture the Flag challenges that test hacking capabilities are common, there has never been a publicly available test for IR related forensic investigation,” said Dori Harpaz, VP, Marketing, Cynet.

“In the course of this timeframe anyone can try their hand, starting from the first and proceeding to the other increasingly difficult IR challenges. We welcome all participants and will reward the most accomplished with a financial prize, recognition and a certificate of completion.”

Success in the IR Challenge will be based on the results as well as the time it took the contestant to solve. At the end of the two-week contest period, a winner will be declared and the results of the challenge will become available. The Cynet IR Challenge questionnaire will remain online afterward as a free resource for IR practitioners.

If you’re a security professional specialized in malware analysis, forensic investigation, incident response, SOC operations and having the skill cyber incidents To participate in the IR Challenge, please register for free at

The contest will remain open until May 15th, 2020.

Steps to Follow

1. Go the Incident response Challenge website and Signup here

2. Start the Challenge and answer the questions that comprised of a variety of Scneraio based incidents.

3. You will know your score only after completing all 25 challenges.

4. Cynet Alogroithm calculates a score based on the number of correct answers and the time it took to solve each question.

5. You are limited to one entry. Anyone who enters more than once will be disqualified.

6. The winner will be announced 72 hours after the competition closes and you will know the winner’s details on 15th May.

7. Winner will receive the amount of $5000 cash prize.


Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles