Categories: Illinois News

Bloomington’s Ugliest Sweater Run returns in December

BLOOMINGTON, Ill. (WMBD) — The annual Ugliest Sweater Run is returning to Bloomington next month.

At 1 p.m. on Saturday, Dec. 13, the 12th annual festive event will take place at Miller Park, according to the event website.

Runners will be able to take part in a one-and-a-half-mile or a three-mile non-competitive run or walk, with prizes awarded for special categories.

Participants can also stop at the selfie stations along the route for pictures and add their ugliest sweater photos to the Facebook event page.

Shirts are also available to purchase. The deadline to order a shirt is Monday, Nov. 24. Limited extra shirts will be available for purchase on race day.

To register for the Ugliest Sweater Run, click here. Admission for only the race costs $10, and admission with the long sleeve shirt costs $30.

For more information on the event, click here.

rssfeeds-admin

Recent Posts

Take-Two Boss Believes in the Pull of GTA 6 Even Amid Rising Cost of Console Gaming

The cost of console gaming has become significantly more expensive in recent months. Sony hiked…

10 minutes ago

Ubiquiti Issues Patches for Critical UniFi OS Privilege Escalation Vulnerabilities

Ubiquiti Networks has released emergency security updates addressing five critical vulnerabilities in its UniFi OS…

24 minutes ago

LiteSpeed cPanel Plugin Zero-Day Exploited for Full Server Root Access.

A critical zero-day privilege-escalation vulnerability in the LiteSpeed User-End cPanel plugin is being actively exploited.…

24 minutes ago

Hackers Exploit F5 BIG-IP SSH Access to Compromise Active Directory

A sophisticated, multi-stage intrusion campaign has been documented by Microsoft’s Defender Security Research team, in…

24 minutes ago

Claude Mythos Preview Identifies Thousands of 0-Day Vulnerabilities

Anthropic’s Project Glasswing has fundamentally altered the cybersecurity landscape by demonstrating how unreleased frontier AI…

25 minutes ago

Hackers Exploit F5 BIG-IP Appliance to Gain SSH Access and Pivot Into Enterprise Linux Networks

A multi-stage intrusion attack where a threat actor exploited an internet-facing F5 BIG-IP edge appliance…

44 minutes ago

This website uses cookies.