BTC $70823.7516
ETH $3531.0259
BNB $621.2790
SOL $172.6448
stETH $3527.9907
XRP $0.6083
DOGE $0.1997
TON $7.2456
ADA $0.5853
AVAX $46.2175
wstETH $4100.4456
DOT $8.4402
BCH $607.1354
WETH $3536.6758
WBTC $70909.4458
TRX $0.1219
LINK $17.6560
MATIC $0.8809
UNI $9.0821
ICP $15.6959
LTC $97.8636
CAKE $3.7041
DAI $0.9996
IMX $2.5675
ETC $33.6641
RNDR $9.1096
FIL $8.1342
STX $2.9994
MNT $1.2895
NEAR $6.8343
TAO $615.5692
VET $0.0503
ATOM $10.8915
HBAR $0.0996
OKB $56.9032
FDUSD $1.0028
WIF $3.3890
KAS $0.1440
MKR $3344.9389
PEPE $0.0000
GRT $0.3114
THETA $2.8807
INJ $31.7467
FET $2.5067
XLM $0.1297
XMR $134.0517
USDE $1.0001
BTC $70823.7516
ETH $3531.0259
BNB $621.2790
SOL $172.6448
stETH $3527.9907
XRP $0.6083
DOGE $0.1997
TON $7.2456
ADA $0.5853
AVAX $46.2175
wstETH $4100.4456
DOT $8.4402
BCH $607.1354
WETH $3536.6758
WBTC $70909.4458
TRX $0.1219
LINK $17.6560
MATIC $0.8809
UNI $9.0821
ICP $15.6959
LTC $97.8636
CAKE $3.7041
DAI $0.9996
IMX $2.5675
ETC $33.6641
RNDR $9.1096
FIL $8.1342
STX $2.9994
MNT $1.2895
NEAR $6.8343
TAO $615.5692
VET $0.0503
ATOM $10.8915
HBAR $0.0996
OKB $56.9032
FDUSD $1.0028
WIF $3.3890
KAS $0.1440
MKR $3344.9389
PEPE $0.0000
GRT $0.3114
THETA $2.8807
INJ $31.7467
FET $2.5067
XLM $0.1297
XMR $134.0517
USDE $1.0001
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cyberattacks

      Hackers leak Microsoft Bing and Cortana source code online

      Microsoft's digital signatures will allow cybercriminals to gain invulnerability to security measures. The Medusa ransomware gang has leaked the source code of Microsoft Bing, Bing Maps and Cortana online, and stated this on their website: “This leak is of more interest to programmers becaus...

    • Drugs

      Alpha-PVP addiction

      When we talk about substances, the key factor for the researcher, in addition to the effect, is the harm of the drug itself. For example, people can use cocaine for a long time, killing their own mucous, nervous system and lifestyle. Addiction is also a factor of harm that interferes with a person&r...

    • Cybersecurity

      Mass distribution of the malicious tool "Legion"

      A new Python-based hacking tool called "Legion" is being sold via Telegram to any willing cybercriminal to initially compromise target systems and gather credentials. Legion is a modular malware that, according to Cado Labs, is most likely based on the AndroxGhOst malware and contains modules for i...

    • Cybersecurity

      UK intelligence: more than 80 countries around the world use spyware against citizens

      While some countries use the tools for their intended purpose, others use them to spy on journalists and dissidents. Over the past 10 years, more than 80 countries around the world have acquired spyware. This was stated by the UK National Computer Security Center (GCHQ), referring to UK intelligenc...

    • Cyberattacks

      RTM Locker attacks from the shadows, avoiding large targets and hiding from law enforcement

      Cybersecurity researchers at cybersecurity firm Trellix have detailed the tactics of a new emerging RTM Locker (“Read The Manual” Locker) group that is a ransomware-as-a-Service (RaaS) provider that attacks for profit. RTM Locker uses affiliates to collect ransom from victims, and all a...

    • Cybersecurity

      iPhone system calendar 'invites' users to install Israeli spyware

      Citizen Lab researchers, together with Microsoft Threat Intelligence, have discovered commercial spyware created by the Israeli company QuaDream, which was used to compromise the iPhone using the ENDOFDAYS Zero-Click exploit. Microsoft dubbed the malware "KingsPawn". The attackers targeted a zero-d...