BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Other

      Hackers use the Sign of the Internet to deliver malware

      The attackers bypass the Windows protection feature and download QBot and Cobalt Strike.Cybersecurity researcher ProxyLife has discovered that new phishing attacks exploit a Windows zero-day vulnerability that delivers Qbot malware bypassing Mark of the Web protections.When files are downloaded from...

    • Other

      Scientists have discovered three new strains of ransomware in the wild

      Remember the names: Octocrypt, Alice and AXLocker, because we will definitely hear about them again.Experts from Cyble Research and Intelligence Labs (CRIL) have discovered three new strains of ransomware: AXLocker, Octocrypt and Alice.AXLocker encrypts victims' files and steals Discord tokens from...

    • Other

      10 Linux Commands That Can Destroy Your System

      As we know, Linux users have many commands and tools that allow them to flexibly customize and control every aspect of the OS. However, with great power comes great responsibility - there are many commands that can disrupt the normal operation of Linux and lead to unfortunate consequences.Therefore,...

    • Other

      Chinese cybercriminals attack Asian government agencies and defense organizations

      In one of the latest reports, Symantec security specialists spoke about the Billbug group, whose activities they have been monitoring since 2018. One of the latest attacks is targeted at a company that provides certification services. According to experts, this is how hackers wanted to get signature...

    • Other

      Australia declares war on hackers

      The Australian government has said the country is launching an offensive against cybercriminals following recent high-profile attacks on Medibank, the largest health insurance company, and telecommunications company Optus.The Australian Federal Police and the Australian Communications Authority will...

    • Other

      Alberta becomes the first province in Canada to legalize the therapeutic use of psychedelics

      The government of Alberta, Canada, formally announced the legalization of the use of therapeutic psychedelics, in particular psilocybin. Officially, legally, it will come into effect at the beginning of the new year. At the moment, the use of psilocybin and a number of other natural psychedelics has...