BTC $70614.7035
ETH $3511.7004
BNB $620.2579
SOL $173.0218
XRP $0.6097
stETH $3507.5030
DOGE $0.1974
TON $7.0340
ADA $0.5814
AVAX $46.2782
wstETH $4079.6154
DOT $8.3856
BCH $610.3232
WETH $3506.2796
WBTC $70620.3107
TRX $0.1214
LINK $17.6767
MATIC $0.8810
UNI $9.1130
LTC $98.3227
ICP $15.5376
CAKE $3.7378
DAI $0.9997
IMX $2.5624
ETC $33.6826
RNDR $9.0476
STX $3.0152
FIL $8.0739
MNT $1.3057
TAO $634.6650
NEAR $6.7707
HBAR $0.0996
ATOM $10.7689
VET $0.0473
OKB $56.7850
WIF $3.4067
FDUSD $1.0024
KAS $0.1425
MKR $3339.9801
PEPE $0.0000
GRT $0.3118
THETA $2.9461
INJ $31.7489
FET $2.5268
XLM $0.1299
XMR $133.8901
USDE $1.0008
BTC $70614.7035
ETH $3511.7004
BNB $620.2579
SOL $173.0218
XRP $0.6097
stETH $3507.5030
DOGE $0.1974
TON $7.0340
ADA $0.5814
AVAX $46.2782
wstETH $4079.6154
DOT $8.3856
BCH $610.3232
WETH $3506.2796
WBTC $70620.3107
TRX $0.1214
LINK $17.6767
MATIC $0.8810
UNI $9.1130
LTC $98.3227
ICP $15.5376
CAKE $3.7378
DAI $0.9997
IMX $2.5624
ETC $33.6826
RNDR $9.0476
STX $3.0152
FIL $8.0739
MNT $1.3057
TAO $634.6650
NEAR $6.7707
HBAR $0.0996
ATOM $10.7689
VET $0.0473
OKB $56.7850
WIF $3.4067
FDUSD $1.0024
KAS $0.1425
MKR $3339.9801
PEPE $0.0000
GRT $0.3118
THETA $2.9461
INJ $31.7489
FET $2.5268
XLM $0.1299
XMR $133.8901
USDE $1.0008
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Arrests

      NLBrute malware creator faces 47 years in US prison

      A hacker accused of developing the NLBrute hacking tool is convicted in Florida for using the tool "to build a criminal empire." According to the US Department of State, Darius Pankov, also known as "dpxaker", created the NLBrute malware, which used brute-force attacks to crack Windows credent...

    • Cryptonews

      Hackers use popular macOS programs to mine cryptocurrency

      Popular in the professional environment, multimedia software is used by hackers to deploy hidden malware for cryptocurrency mining on macOS systems. The malicious campaign was discovered by Jamf Threat Labs. According to experts, the XMRig crypto miner was launched using an unauthorized modificatio...

    • Cybersecurity

      DNS HIJACKING. What is this attack & how does it work?

      Knowing how attackers can attack us, let's understand how DNS interception works and what you can do to protect yourself. DNS hijacking is one type of DNS attack. This attack can be carried out in three ways: By installing malware on the victim's PC; By seizing control of routers; By hacking t...

    • Drugs

      LSA is natural LSD

      Psychedelic drugs can change perceptions, change belief systems, and radically alter states of consciousness. While modern research is rapidly re-introducing substances such as psilocybin and LSD, nature still provides many psychoactive compounds that remain poorly understood. One such substance tha...

    • Cybersecurity

      Royal ransomware extorts up to 11 million dollars from victims

      Royal malware with royal ransom demands. The US Cybersecurity and Infrastructure Security Agency (CISA) said cybercriminals used a variant of the Royal ransomware to attack more than 100 US and international organizations. Once inside the target's system, the hackers disable the antivirus software...

    • Cyberattacks

      Play hacker group claims responsibility for Oakland attack

      American citizens have finally learned who is behind the massive failure of IT networks. The Play ransomware gang has claimed responsibility for a cyber attack on the American city of Oakland that occurred in the first half of February. This attack severely disrupted the city's IT systems. Local au...