BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cyberattacks

      The npm repositories flooded with malicious packages that lead to a DoS attack

      And what about Aliexpress and Telegram channels about cryptocurrency? Information security company Checkmarx reports that attackers are distributing fake packages in npm repositories that lead to a DoS attack. Cybercriminals publish empty packages with links to pre-created malicious sites. The att...

    • Cybersecurity

      New malware from Chinese hackers targeting Linux servers

      Security firm ExaTrack says an unknown Chinese-sponsored hacker group is using new malware to attack Linux servers. ExaTrack experts found samples of malware documented in early 2022, dubbed Mélofée. One of the samples is designed to deliver a kernel-mode rootkit based on the open-so...

    • Arrests

      The most dangerous cybercriminal in Spain turned out to be a 19-year-old teenager

      Spanish police have arrested José Luis Huertas (aka "Alcaseca", "Mango" or "Chimichuri"), a 19-year-old teenager who is considered the most dangerous hacker in the country. Huertas is reportedly responsible for several high-profile cyberattacks against Spanish government institutions, as well...

    • Cybersecurity

      Two-factor authentication and possible ways to bypass it

      We consider in detail the advantages and disadvantages of the most popular way to protect accounts on the Internet. Account security best practices include two-factor authentication (2FA). It is used everywhere for both corporate and personal user accounts around the world. In the classical sense,...

    • Drugs

      The mystical and transcendent experience is proportional to the therapeutic effect of the psychedelic trip

      A medical group at Ohio State University has published an interesting paper that claims that the content of a psychedelic trip can be an effective predictor of the extent of its beneficial, therapeutic effect on the user. This conclusion is supported by an analysis of feedback from almost 1,000 resp...

    • Cybersecurity

      Vulnerability in the underlying Wi-Fi protocol allows attackers to intercept network traffic

      Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 Wi-Fi protocol standard, introduced back in 1997. Vulnerability CVE-2022-47522 allows attackers to trick access points into transmitting so-called "network frames" in unencrypted form, available fo...