• Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • English
  • Deutsch
  • Español
  • Português
  • Français
  • Main Page
  • Blog

Create your jabber account onour server

Use one-time notes to maximizeanonymity level

Create temporaryEmail address

Download TORTemporary emailOne-time notesD2W Jabber server

We strongly recommend downloading the TOR browser exclusively from the official Tor Project website.

Download TOR
article-image 4 days ago

75,000 WordPress websites vulnerable to hacker attacks

article-image 5 days ago

Canadian firm announces readiness for commercial production of psilocybin mushrooms

article-image 4 days ago

Unknown malware terrorizes gambling companies

2 051 visitors today63 online

Jabber: [email protected]Contact us

  • MAPS announces successful completion of phase III MDMA clinical trial for PTSD

    MAPS, the Multidisciplinary Association for the Study of Psychedelics, informed the press of the successful completion of the third and final phase of the association's clinical trial for MDMA. Thus, the research of the organization confirms the effectiveness of the use of this drug in the treatment of PTSD in its various forms and manifestations.This trial, called MAPP2, involved 100 volunteers formally diagnosed with PTSD. As in the case of the previous trial, the use of the substance helped most patients to ease the symptoms of the disease.In parallel, the organization continues trials to study...

    post-image
  • Twitter employees can post messages from any account

    A credible source cited by the American edition of The Washington Post claims that Twitter engineers can use the "GodMode" function and post messages from any account. The company could face a hefty fine if the allegations are confirmed.Following a 2020 hack that saw a group of teenagers leave scam messages from accounts of famous people, Twitter has publicly stated that the issues have been fixed. "However, the existence of GodMode is yet another example that Twitter's public statements to users and investors have been false and/or misleading," according to an article published by The...

    post-image
  • Nutmeg

    The nut begins to act only 2-3 hours after its use, and the effect can last up to a day or longer.In terms of effects, the nut is partly reminiscent of cannabis, partly alcohol, partly other substances. Strange thoughts and troubles are characteristic, music is pleasantly perceived, differentiation of feelings improves, time can slow down, often you want to engage in creative activities, various mystical experiences are possible, sometimes uncontrollable laughter, talkativeness or “freezing” of the psychonaut. In large doses, tactile and auditory hallucinations, a feeling of flying with eyes closed, confusion of thoughts are...

    post-image
  • Chainalysis: $3.8 billion stolen from crypto companies in 2022

    According to the report, about half of the amount was stolen by North Korean hackers.According to an analytical report by Chainalysis, in 2022, hackers stole more than $3 billion from cryptocurrency exchanges. Moreover, about half of this amount was stolen by groups associated with North Korea.In total, a record $3.8 billion was stolen from cryptocurrency exchanges last year by hackers, according to the report. A year earlier, this figure was estimated at $3.3 billion. Most of the money was stolen in October - as a result of 32 attacks, the attackers appropriated about $ 775.7...

    post-image
  • Italy announced a massive cyber attack

    Massive cyber attacks were carried out in Italy on national IT systems.Italy's national cybersecurity agency said on Sunday it was "a massive cyberattack using ransomware." This was reported by the news agency La Repubblica.According to the publication, technical experts have identified dozens of national systems that may be affected by malware.At the same time, according to the newspaper Il Messaggero, there are several thousand hacked servers globally. France suffered the most damage. In Italy, dozens of organizations have been affected by the malware. According to the source, the number of affected organizations will grow.At the...

    post-image
  • Google Play has let scammers into its store again

    A new category of activity tracking apps has been a huge hit on Google Play, the official Android app store, of late. Developers advertise them as apps for building healthy habits, for improving health, as pedometers, etc. A distinctive feature of these applications is that they promise the user very real rewards for achieving goals. For example, the ability to withdraw real money to your bank card.However, according to a recent report from Dr.Web, rewards may not be available to cash out or are only partially available after forcing users to view a huge number...

    post-image
  • White hat hackers release VMware vRealize Log RCE exploit

    Security researchers from the Horizon3 team will release an exploit targeting the chain of vulnerabilities online to enable remote code execution on devices with VMware vRealize Log Insight.Now known as VMware Aria Operations for Logs, it makes it much easier for VMware administrators to analyze and manage system logs.VMware has fixed four security vulnerabilities in this log analyzer, two of which are critical and allow hackers to execute code remotely. Both vulnerabilities are marked as critical with baseline CVSS scores of 9.8/10. They can be used by attackers in low complexity attacks that do not...

    post-image
  • The fixed 2021 vulnerability is actively used in attacks on VMware ESXi servers

    The ESXiArgs campaign has already affected about 3200 servers - administrators were urged to scan their systems.The French Computer Emergency Response Team (CERT-FR) has warned that attackers are actively exploiting the 2021 RCE vulnerability in unpatched VMware ESXi servers to deploy the new ESXiArgs ransomware.Heap buffer overflow RCE vulnerability in OpenSLP service CVE-2021-21974 (CVSS: 8.8) could be exploited by an unauthenticated attacker. It is worth noting that a bug fix was released in February 2021.To block incoming attacks, administrators must disable the vulnerable Service Location Protocol (SLP) on ESXi hypervisors that have not yet been...

    post-image
  • A Dutch hacker sold the personal data of almost all Austrian citizens on the dark web

    In May 2020, on the RaidForums dark web forum, a 25-year-old hacker from the Netherlands (DataBox) put up for sale a dataset that contains the name, gender, address and date of birth of Austrian citizens. The police confirmed its authenticity. The data was stolen from a misconfigured cloud database that the attacker found through a search engine.The set contains about 9 million rows of data. The population of Austria is approximately 9.1 million people. The hacker also put up similar datasets for sale from residents of the Netherlands, Italy, the UK, China, Colombia and Thailand,...

    post-image
  • Substances that are not suitable for parties

    HallucinogensThere are usually a lot of people at the parties, it is extremely noisy, something unexpected can always happen. Any of these factors can drastically spoil the quality and course of a trip under the influence of hallucinogens. But in fact, spoiled impressions are not the worst.After all, there is always the risk of a bad trip, which can drastically disrupt the overall psychological state. Therefore, hallucinogens are more appropriate for a calm environment for maximum enjoyment.Benzodiazepines In this case, the situation is rather ambiguous. After all, in any case, you will not enjoy the...

    post-image
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 197
  • 198
© 2023 DeepWeb
en
en de es pt fr