Cyber Security Simulator
Run a cybersecurity operations centre under siege. Manage your team, defend your clients, and resolve threats through classic arcade mini-games before everything spirals into chaos. Every decision costs money. Every breach costs clients.
You run a cybersecurity operations centre. Clients sign contracts, threats arrive, and you have limited actions per turn to deal with all of it. Hire the wrong team, ignore the wrong threat, and watch the death spiral begin.
Security incidents resolve through classic arcade mini-games — Space Invaders for botnet attacks, Pac-Man for malware sweeps, Minesweeper for network intrusions. The largest threats escalate into full XCOM-style tactical missions.
Every run is different. Every run ends badly if you're not careful. That's the point.
Six classic mini-games reimagined as cyber incident response. Fast, skill-based, instantly readable.
Hire agents, manage budgets, retain clients, and triage threats across a live world map.
Tier 3 APT events trigger XCOM-style squad missions across procedurally generated server rooms.
Darkest Dungeon pressure. Agent burnout. Death spirals. One save slot. No take-backs.
Every security threat launches a classic arcade game reimagined as a cyber incident. Your assigned agents modify the difficulty. Your skill determines the outcome.
// botnet_login_attempts.exe
Waves of botnet login attempts descend on your firewall. Shoot them down before they breach the perimeter. Shield bunkers erode. Enemies speed up. Your SOC Analyst widens your cannon.
// cve_queue_overflow.log
Falling CVE blocks stack up in real time. Clear rows to apply patches before the stack overflows and triggers a breach. Your Pen Tester previews the next three blocks.
// lateral_movement_detected
Navigate a live network topology eating malicious files. The ghosts are active malware processes hunting you down. Your Threat Intel Analyst reveals their movement paths.
// rule_reconstruction_required
Bounce packets to reconstruct firewall rule layers currently under sustained attack. Your Compliance Officer can regenerate a brick layer. Don't miss.
// mitm_intercept_active
Route sensitive data packets across a hostile network while avoiding man-in-the-middle attacks in every lane. Your Threat Intel Analyst shows you the safe timing windows.
// backdoor_scan_initiated
Methodically scan network nodes to locate hidden backdoors without triggering them. Your Pen Tester can safely probe one node per sweep. One wrong click ends everything.
Following development from prototype to Steam release. No hype, just progress.
The game has a name, a domain, and a visual identity. Six mini-games are implemented, the core turn loop is working, and the world map is alive. Here's where we are and where we're going.
The action economy, the agent burnout system, and the death spiral — why limiting the player is the most important design decision in the game.
Subscribe to the mailing list to get dev logs, demo announcements, and early access news directly.