Author name: Mark

Tech-guru, avid streamer, and an expert in all kinds of devices and how to set them up. Mark has written numerous guides on how to set up a VPN and proxies on all kinds of devices.

BianLian Adopts Pure Data Extortion

No More Data Encryption – BianLian Shifts to Pure Data Extortion

Ransomware operations are simple in terms of execution. Threat actors gain access to a system, install encryption payloads in their attacks and ask for a ransom. But when a decryptor is available for a certain ransomware family, the group behind it is forced to seek alternatives. In today’s case, we’re referring to BianLian ransomware. Following

No More Data Encryption – BianLian Shifts to Pure Data Extortion Read More »

Scroll to Top