When Wendy Chen, an IT professional, learns the software in her possession is a malware designed to trigger a missile attack, her first thought is to exploit the position she finds herself in. After confiding in her colleague Guy, an expert in cybersecurity, her plan quickly turns to fear when the true implications of the malware become clear. Together with John, a friend and white hat hacker, they find themselves embattled in a gripping race against time, triads, North Korea's army, and a highly skilled contract killer in order to prevent a global catastrophe.
When Wendy Chen, an IT professional, learns the software in her possession is a malware designed to trigger a missile attack, her first thought is to exploit the position she finds herself in. After confiding in her colleague Guy, an expert in cybersecurity, her plan quickly turns to fear when the true implications of the malware become clear. Together with John, a friend and white hat hacker, they find themselves embattled in a gripping race against time, triads, North Korea's army, and a highly skilled contract killer in order to prevent a global catastrophe.