BTC $57054.0562
ETH $3243.0497
BNB $394.9600
SOL $108.4177
XRP $0.5865
stETH $3239.3493
ADA $0.6239
AVAX $39.2702
DOGE $0.0977
TRX $0.1428
wstETH $3750.7519
DOT $8.3691
LINK $19.0300
WETH $3348.6813
MATIC $1.0282
UNI $10.8579
WBTC $56903.9273
IMX $3.3452
ICP $13.0217
BCH $292.5040
LTC $74.0124
CAKE $3.1570
ETC $28.0992
LEO $4.3640
FIL $7.6578
KAS $0.1689
RNDR $7.2011
DAI $1.0000
ATOM $11.2097
HBAR $0.1082
INJ $40.1071
VET $0.0489
TON $2.1280
OKB $51.4855
FDUSD $0.9985
LDO $3.4670
STX $2.9465
XMR $135.8398
XLM $0.1230
ARB $1.8948
NEAR $3.9608
TIA $17.0031
WEMIX $2.3756
GRT $0.2795
ENS $22.1963
MKR $2154.9330
APEX $2.3329
BTC $57054.0562
ETH $3243.0497
BNB $394.9600
SOL $108.4177
XRP $0.5865
stETH $3239.3493
ADA $0.6239
AVAX $39.2702
DOGE $0.0977
TRX $0.1428
wstETH $3750.7519
DOT $8.3691
LINK $19.0300
WETH $3348.6813
MATIC $1.0282
UNI $10.8579
WBTC $56903.9273
IMX $3.3452
ICP $13.0217
BCH $292.5040
LTC $74.0124
CAKE $3.1570
ETC $28.0992
LEO $4.3640
FIL $7.6578
KAS $0.1689
RNDR $7.2011
DAI $1.0000
ATOM $11.2097
HBAR $0.1082
INJ $40.1071
VET $0.0489
TON $2.1280
OKB $51.4855
FDUSD $0.9985
LDO $3.4670
STX $2.9465
XMR $135.8398
XLM $0.1230
ARB $1.8948
NEAR $3.9608
TIA $17.0031
WEMIX $2.3756
GRT $0.2795
ENS $22.1963
MKR $2154.9330
APEX $2.3329
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Other

      PixPirate is a new banking trojan for Android that uses a dangerous feature

      The malware only targets Brazilian financial systems for now but for how long?A new banking Trojan for Android has targeted Brazilian financial institutions to commit fraud using the Pix payment platform. Italian cybersecurity company Cleafy, which discovered the malware late last year, is tracking...

    • Other

      Cisco has fixed a bug that allowing you to keep the backdoor even when updating

      The malicious package will work until the device is reset to factory settings or until it is manually removed.Cisco released security updates this week to address a dangerous vulnerability in the Cisco IOx application hosting environment that could be used for command injection attacks.Vulnerability...

    • Other

      Legitimate Microsoft VSTO tool will be used more often by hackers to infect devices

      Experts warn that attackers are looking for alternatives to disabled Microsoft Office macros.Security researchers at security firm Deep Instinct warn that hackers may increasingly use Microsoft Visual Studio Tools for Office (VSTO) as a method of resiliency and code execution on a target machine usi...

    • Other

      Iranian hackers use new backdoor to spy on Middle Eastern governments

      Cybercriminals use unknown malware that uses government mail to collect data.Cybersecurity researchers at cybersecurity company Trend Micro say Iranian APT group OilRig (APT34, Cobalt Gypsy, Europium, and Helix Kitten) continues to attack government organizations in the Middle East as part of a cybe...

    • Other

      Minnesota Medical Association urges regional authorities to decriminalize substances

      The Minnesota Medical Association (MMA) has called on state officials to immediately decriminalize the possession and use of drugs and psychoactive substances. As stated in the appeal of the association's representatives, the problem of drug addiction is to be solved by science and medicine, in part...

    • Other

      An exploit has been created that allows hackers to forge a certificate and take over a legitimate site

      Akamai researchers have developed an experimental exploit (PoC) for a public x.509 certificate forgery vulnerability in Windows CryptoAPI that was exposed last year.Microsoft silently fixed bug CVE-2022-34689 in August 2022, but did not publicly disclose it until October. Researchers at Akamai this...