• Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • English
  • Deutsch
  • Español
  • Português
  • Français
  • Main Page
  • Blog

Create your jabber account onour server

Use one-time notes to maximizeanonymity level

Create temporaryEmail address

Download TORTemporary emailOne-time notesD2W Jabber server

We strongly recommend downloading the TOR browser exclusively from the official Tor Project website.

Download TOR
article-image 6 days ago

Bots in Telegram and Discord have gone to the dark side

article-image 14 hours ago

The ShitExpress service was hacked by a client

article-image 4 days ago

17 apps on Google Play distributed a banking Trojan

1 408 visitors today42 online

Jabber: [email protected]Contact us

  • Saudi Arabia invests heavily in Israeli spy tools

    Saudi Leaks, an opposition website citing unnamed sources, said Saudi officials have signed contracts with Israeli firms that involve millions of dollars in annual investments to acquire the most advanced cyber espionage and surveillance technologies.The growing covert cyber-espionage relationship between Saudi Arabia and Israeli companies is set to pave the way for the so-called CyberIC plan, which aims to protect the Kingdom's cybersecurity sector, the sources said.The launch of the plan was announced by the Saudi Arabian National Cybersecurity Authority (NCA) earlier this week. The program aims to develop and build capacity in the field...

    post-image
  • Hired hackers - who are they and how do they earn?

    Hired hackers are secretive cyber experts or groups that specialize in infiltrating organizations and stealing information. They offer their services to people who cannot carry out such an attack on their own for any reason (for example, due to lack of necessary skills).Since 2020, hackers for hire have become even more active, hacking into everything they can get their hands on and impersonating other hackers or users who hired them. One of the reasons for this activity was the COVID-19 epidemic, during which hackers gained the ability to control computers through smart public communication channels...

    post-image
  • Former Conti members team up and hack people

    The Silent Ransom Group (Luna Moth), Quantum and Roy/Zeon, former members of the Conti syndicate, have adopted BazarCall (BazaCall) phishing attacks as their primary method of gaining initial access to the victim's network, according to a new report from Advanced Intelligence experts. This allows attackers to carry out targeted attacks that are harder to detect and stop due to the use of social engineering.The shift to social engineering was driven by the predictability of conventional attacks, which drove down profits as cybersecurity professionals began to implement effective mitigation measures.“We cannot win the technology war because...

    post-image
  • Darknet marketplaces start collaborating with Mexican cartels

    The emergence of new marketplaces cooperating with real Mexican criminals was noticed by DarkOwl analysts. They were able to identify a trend: attackers began to move from large marketplaces that attract the attention of law enforcement agencies to smaller, less well-known sites.The sites discovered by DarkOwl are a mix of old and new marketplaces, spiced up with new features and an updated interface.Cartel de Sinaloa (C.D.S. Market) is a marketplace that may be linked to the infamous Sinaloa Cartel, a major Mexican crime syndicate. The site sells banned substances, various chemicals, weapons, malware, and offers...

    post-image
  • Ketamine - Its Medical Use

    The main medical use of ketamine is as an anesthetic. Ketamine is a white crystalline powder with a slight characteristic odor, easily soluble in water (1:5) and alcohol (pH of aqueous solutions is rather acidic - 3.5 to 4.5). The action of the drug is associated mainly with a depressing effect on the associative zone of the cortex and subcortical formations of the thalamus. Cumulation with repeated administration is not observed.The minimum effective anesthetic dose of intravenous Ketamine is 0.5 mg per kilogram of body weight, while consciousness turns off after 1 to 2 minutes...

    post-image
  • The ShitExpress service was hacked by a client

    Using SQL injection, the user gained access to a database of tens of thousands of pranksters.The ShitExpress web service, which allows you to anonymously send a box of feces to friends along with a personalized message, was hacked after a client discovered a vulnerability.ShitExpress was visited by a user named "Pompompurin", the owner of the hacker forum Breached.co and a notorious hacker who put up for sale the stolen data of 7 million Robinhood customers in 2021.Pompompurin wanted to send a box of poop to cybersecurity researcher Winnie Troy, who are in a long-standing feud...

    post-image
  • Australia fines Google $42.6M for collecting user data

    Google scammed 1.3 million Australians for 2 years by collecting their location data.A federal court in Australia has ordered Google to pay a $42.6 million fine for misleading users when collecting their location data.This refers to location data collected via Android devices between January 2017 and December 2018. Google has misled users into believing that setting up "location history" is the only way to collect location data. However, the Australian Competition and Consumer Commission (ACCC) has found that monitoring web and other application activity also collects and stores local data.In addition, the watchdog estimated that...

    post-image
  • Google expands its CTF program

    Eduardo Vela, head of the Google Cloud Product Security Response Team, said that simply finding vulnerabilities and fixing them is "completely useless." For the company, it is not system errors that are important, but exploits.Therefore, Google's Kubernetes-based open source Capture-the-Flag project (Kubernetes kCTF) does not pay researchers just for discovering a vulnerability in the Linux kernel. Instead, specialists should take advantage of the bug: connect to a Google Kubernetes Engine (GKE) instance, hack it, and use the bug to steal the hidden flags.This is so that the wider community will become aware of this exploit...

    post-image
  • Colombian and Peruvian drug gangs identified in Brazil

    The Brazilian government has ordered the deployment of agents of the National Public Security Forces to indigenous areas in the Amazon region, where foreign drug traffickers have established themselves, threatening the population and employees of the National Indian Foundation (Funai). This was reported on August 10 by The Rio Times.In the state of Amazonas, gangs of drug traffickers have been found, mostly associated with Colombian and Peruvian organizations, who tend to settle in indigenous reserves located in hard-to-reach forest areas.The dispatch of National Forces troops followed a federal police operation that had received intelligence on...

    post-image
  • Classiscam takes over Asia

    This was reported by Group-IB, which has been tracking Classiscam since its first discovery in 2020. Experts believe that the fraudulent scheme originated in Russia, then spread to Europe and the United States, and now, apparently, has headed for Asia. According to IB-Group, the scammers behind Classiscam made about $30 million. All the money earned is divided between the ringleaders, who receive 20-30% of the proceeds, and their "partners" - hired scammers, who share 70-80% of the remaining money among themselves.Fake web pages designed to deceive merchants;Technical support that helps customers when banks try to...

    post-image
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 94
  • 95
© 2022 DeepWeb
en
en de es pt fr