BTC $64550.6577
ETH $3081.3300
BNB $554.5519
SOL $143.3247
stETH $3079.6023
XRP $0.4947
TON $6.9140
DOGE $0.1518
ADA $0.4556
AVAX $35.1974
wstETH $3577.5321
WBTC $64512.2039
WETH $3084.3069
TRX $0.1083
DOT $6.7179
BCH $480.5422
LINK $13.6233
MATIC $0.6703
UNI $7.5114
ICP $13.1141
LTC $80.7633
DAI $1.0049
CAKE $2.8003
RNDR $7.8975
IMX $2.0484
FDUSD $1.0000
ETC $26.0191
MNT $1.1519
STX $2.4241
NEAR $5.7011
OKB $55.1323
FIL $6.0701
TAO $463.5701
VET $0.0407
HBAR $0.0824
MKR $3020.5688
KAS $0.1172
ATOM $8.2589
WIF $2.6998
INJ $27.7406
GRT $0.2570
USDE $1.0005
FET $2.0582
XLM $0.1115
PEPE $0.0000
XMR $117.2399
THETA $2.0573
BTC $64550.6577
ETH $3081.3300
BNB $554.5519
SOL $143.3247
stETH $3079.6023
XRP $0.4947
TON $6.9140
DOGE $0.1518
ADA $0.4556
AVAX $35.1974
wstETH $3577.5321
WBTC $64512.2039
WETH $3084.3069
TRX $0.1083
DOT $6.7179
BCH $480.5422
LINK $13.6233
MATIC $0.6703
UNI $7.5114
ICP $13.1141
LTC $80.7633
DAI $1.0049
CAKE $2.8003
RNDR $7.8975
IMX $2.0484
FDUSD $1.0000
ETC $26.0191
MNT $1.1519
STX $2.4241
NEAR $5.7011
OKB $55.1323
FIL $6.0701
TAO $463.5701
VET $0.0407
HBAR $0.0824
MKR $3020.5688
KAS $0.1172
ATOM $8.2589
WIF $2.6998
INJ $27.7406
GRT $0.2570
USDE $1.0005
FET $2.0582
XLM $0.1115
PEPE $0.0000
XMR $117.2399
THETA $2.0573
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Other

      Nihon Keizai: Japanese infrastructure vulnerable to cyber attacks

      A study by Nihon Keizai has shown that Japan's key infrastructure is vulnerable to cyberattacks. Hackers use security holes to flood cities and interfere with power grids. However, as the newspaper notes, the government does not react.Experts note the presence of vulnerabilities in the cyber infrast...

    • Other

      New Android spyware collects complete user information

      Researchers at the security company Zimperium Labs have discovered a new Android spyware called RatMilad, which was created by cybercriminals in the Middle East and is used to spy on and steal user data. The stolen data can be used to access private corporate systems, blackmail the victim, and for o...

    • Other

      DEA withdraws from ban on two psychoactive substances under public pressure

      At the beginning of the week, the US Drug Enforcement Administration officially informed the public that the agency had abandoned its earlier decision to list the substances DOI (2,5-dimethoxy-4-iodamphetamine) and DOC (2,5-dimethoxy-4-chloramphetamine), which are phenethylamines, on the list substa...

    • Other

      Cybercriminals stole US defense organization data using never-before-seen software

      The incident came to light in a US government report that reported that hackers used a custom CovalentStealer malware and a set of Python classes called Impacket to steal sensitive data from a US defense-industrial complex company.The joint CISA, FBI and NSA report provided technical details of the...

    • Other

      Hackers vs Ferrari

      The Ferrari automaker confirmed the presence of its internal documents on the dark web, but said that it had no evidence of a cyber attack. Ferrari is investigating the leak of internal documents and has announced that it will take all necessary action.The company may have been attacked by ransomwar...

    • Other

      Fortinet urged administrators to urgently update systems

      A critical RCE vulnerability gives an attacker administrative access.Fortinet has alerted its customers to a critical vulnerability affecting FortiGate firewalls and FortiProxy Web Proxy that could potentially allow an attacker to perform unauthorized actions on vulnerable devices.Critical RCE authe...