BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Other

      Google service is used to distribute torrents

      BleepingComputer experts report that attackers are using the Google Looker Studio data visualization service to increase the ranking of their fraudulent sites that distribute spam, torrents and pirated content.The SEO Poisoning attack uses the Google subdomain "datastudio.google.com" to increase tru...

    • Other

      Significant events OVERVIEW in the field of information security over the past week

      The most common passwords of 2022, the danger in Sophos and McAfee products, and the new tool that will be the next Cobalt Strike.NordPass has published a list of the most common passwords of 2022Most of them are simply repetitions of a single character, sequences of easy-to-guess numbers, direct ty...

    • Other

      How to distinguish natural hashish from synthetic

      Classic hashish is made from extracted cannabis trichomes, which contain the main psychoactive components of the herb and cannabinoids. But along with a briquette of a natural product, on the shelves of shops you can often find a Trojan horse, namely, synthetic hashish, which has nothing to do with...

    • Other

      Apps with over 3 million installs leak 'Admin' search API keys

      The Algolia API is used by approximately 11,000 companies to implement search and recommendation on websites and mobile apps.Algolia uses the Admin, Search, Monitoring, Usage and Analytics API keys. Of these keys, only Search is intended for user interaction and is available in front-end code to hel...

    • Other

      Google finds 34 hacked versions of Cobalt Strike in the wild

      According to a Google Cloud Threat Intelligence (GCTI) report, experts have found cracked versions of Cobalt Strike from 1.44 to 4.7, which include 275 unique JAR files. The latest version of Cobalt Strike is 4.7.2.Cobalt Strike is a legitimate commercial tool built for pentesters and red teams and...

    • Other

      Ragnar Locker stole data from the Belgian police, although their target was the municipality

      This data breach was one of the largest in the history of Belgium.Ragnar Locker hackers published stolen data on their website that they thought belonged to the municipality of the Belgian city of Zwijndrecht. But in fact, the published information belonged to the Zwijndrecht police.Experts analyzed...