Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

News > Attacks & Threats > The picoCTF 2026 competition from Carnegie Mellon University

The picoCTF 2026 competition from Carnegie Mellon University

The picoCTF 2026 competition from Carnegie Mellon University is currently underway (10 days), and you can still register:

I got a tip from one of the participants in case you haven't heard of it and need some more practice 😉. It seems to be very taff.

picoCTF is the largest cybersecurity hacking competition for middle school, high school, and college students. Participants aged 13 and older of all skill levels are encouraged to compete. Competitors must reverse-engineer, break, hack, decrypt, and think creatively and critically to solve the challenges and capture the digital flags.

https://picoctf.org/competitions/2026-spring.html

Similar Stories

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal or no user interaction, thanks to skimpy warning dialogs. More...

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...

Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...

Have your say

 

News Categories

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal or no user interaction, thanks to skimpy warning dialogs. More...

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...

Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech