A wave of corruption sweeps over the Network, corroding files and amassing chaos in the real world. Security teams deploy into suspected real world origins, while protective programs are injected within the Network. The origin of the wave was discovered to be in the heart of the Network itself, no user was at fault. The source calmed down after the attack but is placed on close monitoring.

Cover Credit:

Create an account or to write a comment.