BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      How hackers use Tor to steal crypto

      A team of researchers from Kaspersky Lab has revealed a new campaign aimed at stealing cryptocurrencies. According to the company, cybercriminals use the CryptoClipper Trojan, which is distributed on third-party Internet resources under the guise of the Tor browser. When it enters the system, the pr...

    • Cybersecurity

      how did Telegram become the new cyber scam den?

      Now everyone can become a hacker, ordinary Internet users should be even more vigilant! Kaspersky Lab recently noted a new trend in the phishing cybercrime business. According to researchers, the Telegram messenger has recently become much more often used by hackers and other intruders to sell and...

    • Cybersecurity

      Critical vulnerability in ChatGPT allows hackers to take over someone else's account

      The OpenAI team has fixed a critical ChatGPT vulnerability that allows hackers to take over someone else's account, view chat history and access payment information. The mistake was reported to the company by Nagli bughunter and provided a video demonstration. The researcher managed to carry out a...

    • Cybersecurity

      New cryptostealer Rilide shamelessly robs users of Chromium browsers

      The principle of the malware is very similar to CryptoClipper, recently discovered by Kaspersky Lab. Chromium-based web browsers have fallen victim to a new malware called Rilide. The malware disguises itself as a legitimate Google Drive extension and allows attackers to perform a wide range of mal...

    • Cybersecurity

      REF2924 hackers change tactics and move to permanent access to the network

      Security researchers from Elastic Security Labs found that the REF2924 faction has moved from spying to permanent access inside targeted networks. Recently, hackers have added a new backdoor called NAPLISTENER to their arsenal. According to a report from Elastic Security Labs, REF2924 targets sites...

    • Cybersecurity

      How AI became a tool for cybercrime and terrorism

      Hackers are already using ChatGPT to commit crimes, including fraud, cybercrime and terrorism, according to Europol. Even though ChatGPT refuses to fulfill potentially harmful user requests, there are ways to bypass the OpenAI content filtering system. Some users have caused ChatGPT to issue instru...