• Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • English
  • Deutsch
  • Español
  • Português
  • Français
  • Main Page
  • Blog

Create your jabber account onour server

Use one-time notes to maximizeanonymity level

Create temporaryEmail address

Download TORTemporary emailOne-time notesD2W Jabber server

We strongly recommend downloading the TOR browser exclusively from the official Tor Project website.

Download TOR
article-image 4 days ago

On average, 3 out of 10 cybercriminals are female

article-image 6 days ago

In the United States, losses from Internet fraud reached a record $10 billion in 2022

article-image 6 days ago

Emotet malware returns after a three-month hiatus

2 658 visitors today58 online

Jabber: [email protected]Contact us

  • Racing in cyberspace: hackers break into the system in a few minutes

    Ransomware attacks averaged 1,637 hours from network access to payload deployment in 2019, 230 hours in 2020, and 92.5 hours in 2021. The decrease in attack time points to a more sophisticated approach by hackers to make large-scale operations even more profitable.At the same time, the speed of threat detection forces attackers to act faster. Malware can now break into a corporate network in a matter of minutes.According to researchers, the performance of threat detection and response systems in 2021 has improved compared to 2019. In 2019, only 8% of organizations had the ability to...

    post-image
  • Lithuanian authorities are trying to decriminalize drugs

    For illegal possession of a small amount of cannabis, its parts, resin, extracts or tinctures without the purpose of distribution, a group of parliamentarians offers administrative rather than criminal liability, as at present.The number of these drugs, which will be considered insignificant, will be determined on the basis of recommendations approved by order of the Minister of Health.It is proposed to fine with small drugs in the amount of 30 to 250 euros with a warning. For repeated violations, a fine of 250-400 euros faces. In all cases, cannabis, its parts, resin, extracts or tinctures...

    post-image
  • Telegraph platform used for phishing campaigns

    Attackers carry out phishing attacks on the Telegraph anonymous blogging platform by creating temporary landing pages to steal credentials. According to an INKY report, cybercriminals are using Telegraph to create phishing sites in the form of landing pages or a website login form.Email services do not flag the platform as dangerous or suspicious, and attackers use this to launch phishing campaigns. The phishing emails came from stolen email accounts, so the scammers were able to bypass blacklists and spam lists.The purpose of phishing was to scam cryptocurrencies or steal credentials. In some cases, the attackers...

    post-image
  • Recent 0-day vulnerability in Microsoft Office is already being exploited by Chinese hackers

    A cybercriminal group allegedly linked to the Chinese government is actively exploiting a zero-day vulnerability in Microsoft Office known as Follina to remotely execute code on attacked Windows systems.The CVE-2022-30190 vulnerability exists in the Microsoft Windows Support Diagnostic Tool (MSDT) and affects all Microsoft-supported client and server versions of Windows.According to experts from the information security company Proofpoint, the Chinese APT group TA413 exploits Follina to attack their favorite targets - the Tibetans. Posing as the Women's Rights Department of the Central Tibetan Administration (using the tibet-gov.web[.]app domain), attackers distribute Zip archives with malicious Word...

    post-image
  • What are psilocybin mushrooms and how do they affect people's health? - Part 2

    This part will tell you about various types of psilocybin mushrooms in nature. Even though you can find them in nature, most of the people use DarkNet tor darknet darknet diaries 96 to purchase illicit substances. Now we will show you some representatives of mushrooms with such extraordinary properties.Psilocybe mexicanaThe Aztecs, who widely used this mushroom in religious rites and rituals, called it teonanácatl, which literally translates as "the flesh of God."A small convex hat grows from 1 to 3 cm, and is located on a thin stem. They are found in pine, oak forests,...

    post-image
  • 500,000 Facebook victims fell victim to a phishing scam

    The publication Cybernews conducted its own research related to video phishing on Facebook.Facebook has become a favorite destination for attackers who prey on naive members of the Internet community. Therefore, the publication Cybernews conducted its own investigation, dismantling the method of video phishing using the video “Is that you?”. The attack model is quite simple - the hacker pretended to be a friend of the victim and sent a fake video with the caption “Is that you?”. By clicking on the video, the user was taken to a site where he had to enter personal...

    post-image
  • FBI: US Universities VPN Credentials Sold on Russian Cybercrime Forums

    Databases sell for thousands of dollars.Stolen login credentials to university networks and servers can be used to distribute ransomware, spear-phishing campaigns, cryptojacking or espionage. Even credential spoofing attacks become a serious problem when it comes to tens of thousands of stolen passwords.Attackers are stealing login credentials from US college and university networks, according to a new FBI report. The stolen data is then sold to cybercriminals or used in credential spoofing attacks.In 2017, the agency discovered that hackers were cloning university login pages and inserting a link to a credential collector in phishing emails. The...

    post-image
  • New York City urges citizens not to be ashamed to use drugs

    The US Centers for Disease Control and Prevention released a horrifying statistic: Nearly 108,000 Americans died of drug overdoses last year, with two-thirds of those deaths related to fentanyl.The drug fentanyl is part of a number of drugs prescribed for severe pain. American physicians have for many years easily prescribed fentanyl drugs to anyone who complained of even mild pain, and have turned entire generations of their patients into complete drug addicts.In recent years, fentanyl has been illegally produced in drug cartel laboratories. And mix it into cocaine and heroin for greater "efficiency" of drugs.Fentanyl...

    post-image
  • 360 Qihoo: Russian APT Gamaredon may start a new series of DDoS attacks

    Researchers at 360 Qihoo discovered a wave of DDoS attacks launched by APT Gamaredon and reported that the attackers had released their LOIC DDoS Trojan to the public. The samples of malware noticed by experts were collected in early March, a few days after the start of the special operation in Ukraine."We found that from March 4 to March 5, 2022, several C&C servers were distributing an open source LOIC DDoS Trojan compiled by .net," according to an analysis published by 360 Qihoo.By monitoring the activities of APT, experts have noticed that the attackers are...

    post-image
  • The crypto community deceived the hacker and returned the stolen NFTs

    The crypto community World of Solana (WOS) tracked down and returned some of the NFTs stolen for resale. Digital art objects were redeemed for only 2% of the cost assigned by the attacker.It all started with a hack on the Discord channel of the cross-chain game development studio Uncharted NFT. The scammers managed to empty 109 user wallets and steal more than 150 SOL tokens, as well as 25 non-fungible tokens (NFT) World of Solana (WOS), including 3 rare and very valuable digital collectibles.After the hack, the WOS community came up with the perfect plan...

    post-image
  • 1
  • 2
  • ...
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • ...
  • 214
  • 215
© 2023 DeepWeb
en
en de es pt fr