BTC $51740.4000
ETH $3112.6552
BNB $388.4861
SOL $103.4699
XRP $0.5425
ADA $0.5914
AVAX $37.4726
TRX $0.1377
DOGE $0.0861
wstETH $3608.1939
LINK $18.7122
DOT $7.9253
WETH $3099.5051
UNI $11.0991
MATIC $0.9984
WBTC $51892.2111
IMX $3.2035
ICP $12.4694
LTC $70.1056
BCH $267.9077
CAKE $3.1362
FIL $8.1161
ETC $27.2027
KAS $0.1709
RNDR $7.2125
DAI $1.0003
HBAR $0.1094
ATOM $10.3766
INJ $35.7526
TON $2.0791
OKB $50.2401
VET $0.0451
FDUSD $1.0003
LDO $3.3874
GRT $0.2891
ARB $1.9019
STX $2.5976
XMR $129.3498
TIA $16.7710
XLM $0.1165
ENS $22.8347
NEAR $3.7109
APEX $2.4753
WEMIX $2.0914
MKR $2051.3393
RETH $3421.4719
ALGO $0.2075
BTC $51740.4000
ETH $3112.6552
BNB $388.4861
SOL $103.4699
XRP $0.5425
ADA $0.5914
AVAX $37.4726
TRX $0.1377
DOGE $0.0861
wstETH $3608.1939
LINK $18.7122
DOT $7.9253
WETH $3099.5051
UNI $11.0991
MATIC $0.9984
WBTC $51892.2111
IMX $3.2035
ICP $12.4694
LTC $70.1056
BCH $267.9077
CAKE $3.1362
FIL $8.1161
ETC $27.2027
KAS $0.1709
RNDR $7.2125
DAI $1.0003
HBAR $0.1094
ATOM $10.3766
INJ $35.7526
TON $2.0791
OKB $50.2401
VET $0.0451
FDUSD $1.0003
LDO $3.3874
GRT $0.2891
ARB $1.9019
STX $2.5976
XMR $129.3498
TIA $16.7710
XLM $0.1165
ENS $22.8347
NEAR $3.7109
APEX $2.4753
WEMIX $2.0914
MKR $2051.3393
RETH $3421.4719
ALGO $0.2075
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Other

      Firmware vulnerabilities in Qualcomm Snapdragon allow hackers to control even a turned off computer

      Cybersecurity researchers at Binarly Research have discovered multiple high-severity vulnerabilities in the Qualcomm Snapdragon chipset.The flaws were found in the UEFI firmware and affect laptops and ARM-based devices using Qualcomm Snapdragon chips. Qualcomm disclosed the vulnerabilities on Januar...

    • Other

      Scientists conducted the world's first cyberattack using artificial intelligence

      A team of scientists has demonstrated a new attack using the Text-to-SQL model to generate malicious code that can allow an attacker to collect sensitive information and conduct DoS attacks.To better interact with users, database applications use artificial intelligence techniques that can translate...

    • Other

      What vulnerabilities will be the main threats in 2023?

      Here is some appealing information about which vulnerabilities will be of the greatest value among malefactors in 2023.Experts of Positive Technologies presented the top vulnerabilities that became the most popular among attackers last year, and told which vulnerabilities will be of the greatest val...

    • Other

      [TROJAN HORSE] data thieves penetrate the computer along with pirated software

      Raccoon and Vidar malware has long been distributed through hacked websites.The French company SEKOIA.IO, specializing in cybersecurity, has discovered an entire infrastructure of fake sites for downloading pirated software. More than 250 domains are used to spread malware. Moreover, the sites have...

    • Other

      Malicious packages were hosted on a popular repository

      Several hundred people managed to download malicious software onto their computers.This month, an unknown attacker under the nickname “Lolip0p” uploaded three malicious packages to the PyPI (Python Package Index) repository that contain code for the subsequent installation of infostealers.The malici...

    • Other

      Bitdefender released MegaCortex ransomware decryptor for free

      Antivirus company Bitdefender has released a decryptor for the MegaCortex ransomware family, allowing victims of the once infamous gang to recover their data for free.The creation of the decryptor was the result of the joint work of Bitdefender analysts and experts from Europol, the NoMoreRansom pro...