BTC $56772.0455
ETH $3229.2692
BNB $393.0365
SOL $106.6536
stETH $3224.6597
XRP $0.5621
ADA $0.6137
AVAX $38.6261
DOGE $0.0960
TRX $0.1415
wstETH $3753.2551
DOT $8.0619
LINK $18.8685
WETH $3222.5827
MATIC $1.0217
UNI $10.5943
WBTC $56672.8182
IMX $3.2827
ICP $12.8638
BCH $296.0952
LTC $73.4211
CAKE $3.1049
LEO $4.3751
ETC $27.6986
FIL $7.7121
KAS $0.1681
RNDR $7.1714
DAI $0.9992
HBAR $0.1085
ATOM $10.9103
INJ $37.3719
VET $0.0480
TON $2.1032
OKB $51.5043
FDUSD $1.0007
LDO $3.4620
STX $3.0518
XMR $133.5710
ARB $1.8885
XLM $0.1189
GRT $0.2844
TIA $16.9400
NEAR $3.9210
ENS $21.6903
MKR $2126.5962
WEMIX $2.0704
APEX $2.3723
BTC $56772.0455
ETH $3229.2692
BNB $393.0365
SOL $106.6536
stETH $3224.6597
XRP $0.5621
ADA $0.6137
AVAX $38.6261
DOGE $0.0960
TRX $0.1415
wstETH $3753.2551
DOT $8.0619
LINK $18.8685
WETH $3222.5827
MATIC $1.0217
UNI $10.5943
WBTC $56672.8182
IMX $3.2827
ICP $12.8638
BCH $296.0952
LTC $73.4211
CAKE $3.1049
LEO $4.3751
ETC $27.6986
FIL $7.7121
KAS $0.1681
RNDR $7.1714
DAI $0.9992
HBAR $0.1085
ATOM $10.9103
INJ $37.3719
VET $0.0480
TON $2.1032
OKB $51.5043
FDUSD $1.0007
LDO $3.4620
STX $3.0518
XMR $133.5710
ARB $1.8885
XLM $0.1189
GRT $0.2844
TIA $16.9400
NEAR $3.9210
ENS $21.6903
MKR $2126.5962
WEMIX $2.0704
APEX $2.3723
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      Action1 RMM platform used to establish persistence and deploy ransomware

      Security researchers warn that cybercriminals have increasingly used Action1 remote access software to persist on compromised networks and execute commands, scripts and binaries. Action1 is a remote monitoring and management (RMM) product that is commonly used by managed service providers (MSPs) an...

    • Cybersecurity

      A little-known iPhone tweak will allow thieves to permanently take over your account

      It seems that Apple specialists wanted to do the best, but it turned out as always... The recent surge in iPhone thefts in the US and other countries has shown that Apple devices are highly vulnerable to hackers when used in public places. At the end of February, we already wrote that a simple pass...

    • Cyberattacks

      Hackers leak Microsoft Bing and Cortana source code online

      Microsoft's digital signatures will allow cybercriminals to gain invulnerability to security measures. The Medusa ransomware gang has leaked the source code of Microsoft Bing, Bing Maps and Cortana online, and stated this on their website: “This leak is of more interest to programmers becaus...

    • Drugs

      Alpha-PVP addiction

      When we talk about substances, the key factor for the researcher, in addition to the effect, is the harm of the drug itself. For example, people can use cocaine for a long time, killing their own mucous, nervous system and lifestyle. Addiction is also a factor of harm that interferes with a person&r...

    • Cybersecurity

      Mass distribution of the malicious tool "Legion"

      A new Python-based hacking tool called "Legion" is being sold via Telegram to any willing cybercriminal to initially compromise target systems and gather credentials. Legion is a modular malware that, according to Cado Labs, is most likely based on the AndroxGhOst malware and contains modules for i...

    • Cybersecurity

      UK intelligence: more than 80 countries around the world use spyware against citizens

      While some countries use the tools for their intended purpose, others use them to spy on journalists and dissidents. Over the past 10 years, more than 80 countries around the world have acquired spyware. This was stated by the UK National Computer Security Center (GCHQ), referring to UK intelligenc...