The LotusCare Breach
A fictional cyber incident response simulation for students and early‑career analysts. You will follow a realistic breach across multiple environments, make sense of the artefacts, and document your findings.
This is a text‑first, low‑tech friendly experience. All content is local to your browser.
Enter Simulation →- Trace the extortion narrative and evidence trail
- Review internal briefings, regulator correspondence, and media pressure
- Collect artefacts and build a defensible timeline
Works best on laptop/desktop. Keyboard navigation supported.