BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      Exploit in VM2 library allows a hacker to bypass Java protections

      A security researcher has released a Sandbox Escape PoC exploit that allows malicious code to be executed on a host running a VM2 sandbox. VM2 is a specialized JavaScript sandbox used to run and test untrusted code in a sandbox that prevents the code from accessing host system resources or external...

    • Cybersecurity

      Hackers Are Increasingly Finding Ways to Bypass Advanced Cybersecurity Tools

      Are even modern EDR solutions powerless against the sophisticated methods of cybercriminals? EDR software is universally recognized as a good way to protect your organization from destructive attacks from ransomware and other malicious software. As hacking has become more destructive and pervasive,...

    • Cybersecurity

      Israel remains the Number 1 target for hacktivists of all stripes

      Anonymous Sudan, Mysterious Team and Team Insane PK topped the rating of religiously motivated hacker associations. The Radware Security Research Center published a detailed report on hacktivism late last week. According to the data received, most of the destructive actions of hacker activists taki...

    • Cybersecurity

      Brazilian authorities decided to block Telegram in the country

      A Brazilian court ruled to ban Telegram due to its refusal to provide data on neo-Nazis. The Brazilian court ruled to block Telegram in the country due to the incompleteness of the data provided to the police. In addition, the court increased the fine for the messenger, imposed by the lower court,...

    • Cryptonews

      The hacker became the leader in the liquidity pool of the Curve crypto exchange

      The SEC warns of possible risks for users of Curve and DeFi platforms in general. In September 2022, an unknown hacker stole about $160 million from the cryptocurrency market maker Wintermute and became the largest liquidity provider in Curve Finance, deployed on the Ethereum blockchain. The stole...

    • Cybersecurity

      OpenAI hit the ceiling in the development of neural networks

      According to OpenAI CEO Sam Altman, the trend of regularly presenting ever larger AI models to the public is coming to an end. The extremely rapid development of neural networks, which people have just begun to get used to, should now slow down significantly. Speaking at an MIT event, Altman sugges...