BTC $65266.0064
ETH $3170.2759
BNB $579.9567
SOL $151.5810
stETH $3170.3792
XRP $0.5307
DOGE $0.1622
TON $6.2152
ADA $0.5047
AVAX $37.5087
wstETH $3690.1011
WBTC $65350.8728
DOT $7.1858
WETH $3168.2550
TRX $0.1112
BCH $512.3933
LINK $14.9136
MATIC $0.7262
ICP $15.2978
UNI $7.8248
LTC $85.1449
DAI $1.0008
RNDR $9.1190
CAKE $2.9399
IMX $2.1935
STX $2.8650
ETC $27.9082
FDUSD $0.9998
MNT $1.2003
NEAR $6.3271
FIL $6.6129
OKB $55.7832
HBAR $0.0909
TAO $475.1056
VET $0.0423
WIF $3.0785
ATOM $8.6865
MKR $3070.6157
KAS $0.1185
FET $2.4759
GRT $0.2860
INJ $29.1371
PEPE $0.0000
USDE $0.9998
XLM $0.1150
THETA $2.2569
XMR $121.6010
BTC $65266.0064
ETH $3170.2759
BNB $579.9567
SOL $151.5810
stETH $3170.3792
XRP $0.5307
DOGE $0.1622
TON $6.2152
ADA $0.5047
AVAX $37.5087
wstETH $3690.1011
WBTC $65350.8728
DOT $7.1858
WETH $3168.2550
TRX $0.1112
BCH $512.3933
LINK $14.9136
MATIC $0.7262
ICP $15.2978
UNI $7.8248
LTC $85.1449
DAI $1.0008
RNDR $9.1190
CAKE $2.9399
IMX $2.1935
STX $2.8650
ETC $27.9082
FDUSD $0.9998
MNT $1.2003
NEAR $6.3271
FIL $6.6129
OKB $55.7832
HBAR $0.0909
TAO $475.1056
VET $0.0423
WIF $3.0785
ATOM $8.6865
MKR $3070.6157
KAS $0.1185
FET $2.4759
GRT $0.2860
INJ $29.1371
PEPE $0.0000
USDE $0.9998
XLM $0.1150
THETA $2.2569
XMR $121.6010
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cyberattacks

      New GoBruteforcer Botnet Targets phpMyAdmin, MySQL, FTP, Postgres Applications

      Malware operators are expected to adapt it for all possible platforms. A recently discovered Golang-based botnet called GoBruteforcer scans and infects web servers running "phpMyAdmin", "MySQL", "FTP" and "Postgres" services. This was stated by security researchers from Palo Alto Networks Unit 42,...

    • Cyberattacks

      Parallax RAT attacks cryptocurrency companies with sophisticated malware injection techniques

      Cryptocurrency organizations have become a new target for attack as part of a malicious campaign to distribute the Parallax RAT remote access trojan. Malware “uses injection techniques to hide in legitimate processes, making it harder to detect,” according to a new Uptycs report. "Once t...

    • Cyberattacks

      New framework for post-exploitation Exfiltrator-22 from the creators of LockBit

      Security company CYFIRMA said that unknown hackers are promoting a new framework called "Exfiltrator-22" designed to spread ransomware on corporate networks and evade detection. The researchers claim that Exfiltrator-22 was created by former Lockbit 3.0 affiliates who are experts in anti-analysis a...

    • Cybersecurity

      An information security specialist in one tweet wrote a PoC exploit for a critical vulnerability in Microsoft Word

      The expert shortened the code to 140 characters to bring more administrators to the problem. Researcher and information security expert Joshua Drake tweeted a PoC exploit code for a critical RCE vulnerability in Microsoft Word. The RCE vulnerability CVE-2023-21716 was fixed in February and allows...

    • Cyberattacks

      To pay or not to pay - that is the question

      What should be considered by companies that are faced with ransomware? As ransomware attacks become more common and sophisticated, the decision to pay or not pay a ransom becomes more difficult. It is difficult to know for sure what proportion of ransomware victims worldwide transfer money to hack...

    • Drugs

      Which countries have the best marijuana?

      The hemp revolution is steadily sweeping the planet, contributing not only to world pop culture, but also to the budgets of many countries. Humanity is gradually realizing the potential benefits of cannabis. Today we will talk about countries known for their culture of cannabis consumption and varie...