Simulate a cyber-attack

Simulate a live cyber-attack during the exercise

Last updated