How to Simulate a Ransomware Attack on Iqra Healthcare: Step-by-Step Guide | Cybersecurity Tutorial