Categories: Wallarm News

We support student CTF teams

The worldwide CTF community continues to thrive. Many of the organizers of online qualifiers are also holding amazing offline finals in many different cities and countries around the world. This allows participants not only to have a chance at claiming winning places but also to see the world and meet new, interesting people — a real adventure.

Alas, not every team can afford flying to another country and staying there for the duration of the event, especially when it comes to student players. There’s nothing quite as disheartening as qualifying for the finals yet lacking the funds to get on a plane and actually make it there. We’ve been in that situation ourselves, and it isn’t fun, so we’d like to extend a helping hand to those who find themselves in such an unfortunate predicament now.

Anyway, let’s get down to it. Any student team that has passed their qualifiers is eligible to receive a travel grant from Wallarm, which partially compensates the cost of attending CTF finals.

The terms are simple:

  • The total amount of the grant cannot exceed $3,133.7
  • The grant is issued once every calendar quarter (as long as at least one application has been submitted)
  • The team must consist of students
  • Should multiple requests be received, the team to receive the grant is identified by their current CTF Time rating
  • Requests are accepted via e-mail: ctf@wallarm.com

The first grant has already been awarded to the Leet More students team for their trip to RuCTF in Yekaterinburg. Their team was the first to react to our tweet announcing our search for teams to participate in our sponsorship program with such a hardship.

And yes, we’re still looking for a team to sponsor for the next quarter!

Tags: Hacker News

Recent Posts

CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First

Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…

6 days ago

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

3 weeks ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

4 weeks ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

1 month ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

2 months ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

2 months ago