BTC $65266.0064
ETH $3170.2759
BNB $579.9567
SOL $151.5810
stETH $3170.3792
XRP $0.5307
DOGE $0.1622
TON $6.2152
ADA $0.5047
AVAX $37.5087
wstETH $3690.1011
WBTC $65350.8728
DOT $7.1858
WETH $3168.2550
TRX $0.1112
BCH $512.3933
LINK $14.9136
MATIC $0.7262
ICP $15.2978
UNI $7.8248
LTC $85.1449
DAI $1.0008
RNDR $9.1190
CAKE $2.9399
IMX $2.1935
STX $2.8650
ETC $27.9082
FDUSD $0.9998
MNT $1.2003
NEAR $6.3271
FIL $6.6129
OKB $55.7832
HBAR $0.0909
TAO $475.1056
VET $0.0423
WIF $3.0785
ATOM $8.6865
MKR $3070.6157
KAS $0.1185
FET $2.4759
GRT $0.2860
INJ $29.1371
PEPE $0.0000
USDE $0.9998
XLM $0.1150
THETA $2.2569
XMR $121.6010
BTC $65266.0064
ETH $3170.2759
BNB $579.9567
SOL $151.5810
stETH $3170.3792
XRP $0.5307
DOGE $0.1622
TON $6.2152
ADA $0.5047
AVAX $37.5087
wstETH $3690.1011
WBTC $65350.8728
DOT $7.1858
WETH $3168.2550
TRX $0.1112
BCH $512.3933
LINK $14.9136
MATIC $0.7262
ICP $15.2978
UNI $7.8248
LTC $85.1449
DAI $1.0008
RNDR $9.1190
CAKE $2.9399
IMX $2.1935
STX $2.8650
ETC $27.9082
FDUSD $0.9998
MNT $1.2003
NEAR $6.3271
FIL $6.6129
OKB $55.7832
HBAR $0.0909
TAO $475.1056
VET $0.0423
WIF $3.0785
ATOM $8.6865
MKR $3070.6157
KAS $0.1185
FET $2.4759
GRT $0.2860
INJ $29.1371
PEPE $0.0000
USDE $0.9998
XLM $0.1150
THETA $2.2569
XMR $121.6010
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      DNS HIJACKING. What is this attack & how does it work?

      Knowing how attackers can attack us, let's understand how DNS interception works and what you can do to protect yourself. DNS hijacking is one type of DNS attack. This attack can be carried out in three ways: By installing malware on the victim's PC; By seizing control of routers; By hacking t...

    • Cybersecurity

      Royal ransomware extorts up to 11 million dollars from victims

      Royal malware with royal ransom demands. The US Cybersecurity and Infrastructure Security Agency (CISA) said cybercriminals used a variant of the Royal ransomware to attack more than 100 US and international organizations. Once inside the target's system, the hackers disable the antivirus software...

    • Cybersecurity

      Previously unknown Android spyware targets South Korean journalists

      North Korean government hackers spy on South Korean journalists using an infected Android app as part of a social engineering campaign. This was reported by the South Korean non-profit organization Interlab, which discovered a new malware called RambleOn. The application gives access to the target'...

    • Cybersecurity

      Samsung will protect its users from invisible Zero-Click attacks

      Samsung has announced a new feature called Message Guard, which protects users from malicious activities using so-called "Zero-Click" attacks. The South Korean conglomerate said the solution "proactively" protects users' devices by "limiting exposure to invisible threats disguised as image attachme...

    • Cybersecurity

      Asian scammers made about $3 million using "Pig Butchering" method

      The attackers ingratiated themselves and convinced their victims to voluntarily invest money on fake crypto platforms. Last October, Sean Gallagher, a senior threat researcher at cybersecurity firm Sophos, received an unexpected text message from a young Malaysian woman who identified herself as Ha...

    • Cybersecurity

      Updated Pakistani Trojan ReverseRAT targets Indian government agencies

      Security company ThreatMon has discovered a spear-phishing campaign targeting government agencies in India that leads to the deployment of an updated version of the ReverseRAT trojan. ThreatMon experts attributed this activity to the SideCopy group. SideCopy is a Pakistani-born hacker group that ov...