• Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • English
  • Deutsch
  • Español
  • Português
  • Français
  • Main Page
  • Blog

Create your jabber account onour server

Use one-time notes to maximizeanonymity level

Create temporaryEmail address

Download TORTemporary emailOne-time notesD2W Jabber server

We strongly recommend downloading the TOR browser exclusively from the official Tor Project website.

Download TOR
article-image 7 hours ago

BATLOADER malware uses Google Ads to deliver Vidar and Ursnif infostealers

article-image 7 hours ago

Cybersecurity specialists created BlackMamba polymorphic malware using AI

article-image 4 days ago

TeamTNT distributes a miner that is not detected by security tools

2 666 visitors today61 online

Jabber: [email protected]Contact us

  • Cybercriminals exploit critical Telerik UI vulnerability to mine Monero

    The Blue Mockingbird group used the Telerik UI vulnerability to compromise servers, install Cobalt Strike beacons, and mine Monero by stealing system resources.Blue Mockingbird exploited the RCE vulnerability CVE-2019-18935 with a CVSS score of 9.8 in the Telerik UI library for ASP.NET AJAX. To use CVE-2019-18935, the group must obtain encryption keys that secure the Telerik UI serialization. This is possible by exploiting other bugs CVE-2017-11317 and CVE-2017-11357.After obtaining the keys, Blue Mockingbird can compile a malicious DLL file with code that will be executed during deserialization. The group can also run the DLL in...

    post-image
  • The US Department of Justice announced the elimination of a hacker network from Russia

    The US Department of Justice announced that the infrastructure of the Russian botnet, known as RSOCKS, has been eliminated.The operation was reportedly carried out jointly by the US, UK, Germany and the Netherlands. A network called RSOCKS connected millions of hacked computers and other electronic devices around the world.The ministry said in a statement that the operation to combat the hacker network began in 2017. Then it turned out that the criminals hacked about 325 thousand electronic devices, many of which were located in San Diego County.The botnet was originally designed for use in the...

    post-image
  • New dangerous drugs appeared in Lithuania

    In Lithuania, as well as throughout Europe, the spread of drugs is growing, more and more powerful psychoactive substances are being used more often, and the people who use them do not know what they are buying. This was announced on June 14 by specialists from the Department for the Control of Drugs, Tobacco Products and Alcohol (NTAKD).The deputy director of the NTAKD, Grazhyna Belyan, said that the coronavirus pandemic and the war in Ukraine influenced drug use. Over the past 5 years, drug use has increased, but it is difficult to say exactly how...

    post-image
  • Marijuana boom in Thailand

    Marijuana has suddenly become a hot trend in Thailand with many Thai restaurants openly serving cannabis-infused dishes and drinks after marijuana was removed from the list of illegal drugs on June 9. Numerous shops openly sell marijuana and smoking paraphernalia, with plants once secretly grown in the backyard now cultivated and sold openly, according to the Thai Public Broadcasting Service.One of Nonthaburi's grocery stores, housed in a converted shipping container, is now offering a hemp cheese burger and fried chicken with fried crushed hemp leaves. The owner said the leaves are also used in chicken...

    post-image
  • 18.5GB of BeanVPN user data exposed

    Cybernews experts discovered an open database containing 18.5 GB of BeanVPN VPN connection logs. The database contains over 25 million records of user diagnostic information, including:· ID of user devices;· Play Service ID;· IP addresses;· connection timestamps.“The information can be used to deanonymize BeanVPN users and determine their approximate location using the GeoIP service databases. The Play Service ID allows you to determine the user's email address that is tied to Google services,” said Cybernews security researcher Aras Nazarov.The discovered ElasticSearch database is now closed. The researchers reported the open database to BeanVPN developer IMSOFT,...

    post-image
  • Dangerous vulnerability in Microsoft Azure allows account hijacking

    Microsoft has implemented additional enhancements to address the recently discovered SynLapse vulnerability to address the complex tenant isolation requirements in Azure Data Factory and Azure Synapse Pipelines.Security measures taken include moving common integration runtimes to isolated ephemeral instances and using scoped tokens to prevent an attacker from using a client certificate to access other users' accounts.“This means that if an attacker can execute code in the integration runtime, he will not be able to interact with other tenants, so sensitive data will be safe,” the Orca Security technical report states.According to Microsoft, the company has...

    post-image
  • Scientists have discovered an unexpected effect of smoking cannabis

    Scientists from the University of New Mexico, USA, as a result of a new study concluded that the use of cannabis makes a person more sweet, more empathetic, and most importantly, not so greedy, according to Futurism.Most scientists who study the effects of cannabis use are focused either on the medical aspects of the use or on the negative effects of the drug on humans. After all, it is believed that the addiction that cannabis use can cause affects the study or work of a person. Cannabis use has also been linked to the development...

    post-image
  • Experts have discovered NSA spy weapons

    US military and government cyber agencies have remotely stolen more than 97 billion internet data and 124 billion telephone records in the last 30 days, which have become the main source of intelligence for the US and other countries of the Five Eyes alliance.An exclusive classified report from cybersecurity information platform Anzer describes the black hand operations of the NSA's hacking arm Tailored Access Operations (TAO), which uses state-of-the-art cyberweapons to capture user data around the world.According to the report, China managed to get hold of an NSA spy tool that is able to hide...

    post-image
  • Cryptocurrency holders can lose their funds

    Cybercriminals impersonate popular crypto platforms (Binance, Celo, and Trust Wallet) and send phishing emails to steal victim credentials and cryptocurrency.“As cryptocurrencies and NFTs become more and more popular, the chances of falling victim to scams increase. The proliferation of cryptocurrencies has also provided attackers with a new method to steal cryptocurrencies,” according to a new Proofpoint report.The rapid development of Web3 technology in recent years has caused a surge in phishing campaigns aimed at stealing cryptocurrencies through credential harvesting and spreading malware.The campaigns include spam messages with links to fraudulent URLs that download malware and...

    post-image
  • Cannabis science degree anyone? It’s now offered in Thailand

    Thailand officially removed cannabis and hemp from Category 5 on its list of narcotics on June 9. This means these once highly prohibited plants can now be grown at home for cooking and medicinal purposes.If you’re in Thailand, you can also smoke in private and enjoy its medicinal and health benefits by eating edibles and drinking tea, coffee or anything with cannabis.Those wanting to grow cannabis plants for commercial purposes, however, must still obtain a permit from authorities.But a degree in cannabis science? Well, that’s another step to make Thailand a cannabis hub in Southeast...

    post-image
  • 1
  • 2
  • ...
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • ...
  • 214
  • 215
© 2023 DeepWeb
en
en de es pt fr