• Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • English
  • Deutsch
  • Español
  • Português
  • Français
  • Main Page
  • Blog

Create your jabber account onour server

Use one-time notes to maximizeanonymity level

Create temporaryEmail address

Download TORTemporary emailOne-time notesD2W Jabber server

We strongly recommend downloading the TOR browser exclusively from the official Tor Project website.

Download TOR
article-image 1 day ago

Experts link Maui ransomware to North Korean gang Andariel

article-image 4 days ago

North Korean group Lazarus is recruiting for a team of experts on Coinbase

article-image 5 days ago

Disclosed details of a devastating cyber attack on the government of Albania

2 343 visitors today66 online

Jabber: [email protected]Contact us

  • What are drugs? When and how did they massively appear in the life of mankind? - Pt.3

    At the beginning of the nineteenth century, science began to put its hand in improving and improving the "consumer properties" of drugs, having learned to isolate pure alkaloids, highly effective narcotic active elements from plant materials. The first step was taken in 1803, when the Hanoverian pharmacist Friedrich Sertürner was able to break down opium and isolate a white crystalline powder that was 10 times stronger than opium. He named his drug after the Greek god of sleep, morphine.The invention of the syringe for injection, made in 1853 by Charles-Gabriel Pravaz, opened the next stage...

    post-image
  • Tornado Cash developer arrested in the Netherlands

    The detainee is suspected of concealing criminal cash flows and facilitating money laundering.The Dutch Financial Crimes Enforcement Agency (FIOD) in Amsterdam has arrested a 29-year-old programmer. The young man is suspected of involvement in money laundering through the Tornado Cash cryptomixer.“Multiple arrests are not ruled out,” the organization said in a statement.FIOD launched an investigation into Tornado Cash in June. There is a suspicion that Tornado Cash was used to hide large-scale criminal cash flows, including from the theft of cryptocurrencies.According to the investigation, at least $1 billion worth of cryptocurrencies of criminal origin passed...

    post-image
  • In Austria, called the main channels for the supply of drugs to the country

    Drug trafficking in Austria mainly comes from the Balkans, the criminals involved in this are very well organized and modern, said Daniel Lichtenegger, head of the Austrian police narcotics department, N1 reports on August 7.He noted that before the main flow of drugs was controlled by people from Africa, but now the first place is occupied by people from the Balkans.“Now the Serbs are in first place. They are very tightly organized. I must say that this is a company with a very good position,” said Lichtenegger.He added that this is becoming a serious problem.

    post-image
  • Cyber attack brings trade to a halt in Germany

    The Association of German Chambers of Industry and Commerce (DIHK) has shut down all of its IT systems and turned off digital services, phones and email servers following a massive cyberattack.Disabling systems is a precautionary measure and a way to give IT professionals time to develop a solution and create protection, according to a statement from DIHK. Some services for companies are gradually becoming available after a thorough security review. At the moment, there is a partial restoration of systems.DIHK CEO Michael Bergmann described the incident as "massive" but did not specify how long the...

    post-image
  • Opiates

    Opiates are a series of narcotic substances that are natural alkaloids of opium or its synthetic counterparts. Opiates irritate the opiate receptors of the nervous system, being external analogues of the endorphin receptor series. This series of substances has been familiar to mankind since ancient times. Opiates have a strong euphoric and sedative effect on the mind and body and psyche of the user. Do opiates have a drug effect? Undoubtedly, opiates are highly addictive. A few samples of the drug are enough to form a pathological addiction.All horror stories about drug addicts, syringes and...

    post-image
  • Experts link Maui ransomware to North Korean gang Andariel

    Kaspersky Lab specialists spoke about the possible connection of the Maui ransomware with the Andariel APT group, which is part of Lazarus. Analysts at the company noticed traces of Andariel attacks on victims in Japan, the United States, India, Vietnam, and Russia.According to them, in their attacks, the hackers used modifications of the DTrack malware, deploying it about 10 hours before the attack using Maui. These modifications were 84% similar to the malware samples used in Andariel's malware campaigns.In addition, Kaspersky Lab experts analyzed the tactics, techniques, and procedures used in the Maui attacks and...

    post-image
  • The collapse of Conti led to a decline in ransomware attacks

    Ransomware attacks on industrial systems continued in Q2 2022, with 125 incidents identified, according to a report by Dragos researchers.Through publicly disclosed incidents, network telemetry, and dark web postings, the company monitors 43 different groups of ransomware, with only 23 groups active in the second quarter of 2022.Experts detected only 125 attacks in Q2 2022. This is less than 158 attacks in the first quarter. Dragos attributed the decline in attacks to the collapse of Conti, which previously accounted for about 25% of attacks on industrial organizations and infrastructure.Of the total number of attacks on...

    post-image
  • Killnet hackers release details of Lockheed Martin employees

    The data of 400 employees of the American arms manufacturer has been posted.The Russian hacker group Killnet has released evidence of a breach of the website of the American military-industrial corporation Lockheed Martin. The published data includes emails, photos and passwords of 441 Lockheed Martin employees.“Until yesterday, they were saying all Lockheed Martin employee data is safe (no). What are we going to do with employee data?” - the publication says.A spokesman for Lockheed Martin said the company is aware of Killnet's claims but insists the organization has "policies and procedures in place to mitigate...

    post-image
  • Palo Alto Networks firewall conducts DoS attacks on users

    A dangerous vulnerability on the platform allows you to change the firewall configuration and put the victim's computer to sleepPalo Alto Networks is working on fixes for a DoS vulnerability on its PAN-OS platform, which runs firewalls from various vendors, including Palo Alto Networks. The attacker tried to use these firewalls, including the Palo Alto Networks firewall, for DDoS attacks. At the moment, there is no additional information about these attacks and affected companies.The high severity vulnerability CVE-2022-0028 with a CVSS score of 8.6 exists due to a misconfiguration of the PAN-OS URL filtering policy,...

    post-image
  • What are drugs? When and how did they massively appear in the life of mankind? - Pt.2

    TUNE IN FOR PART 1The intensification of campaigns of conquest and trade relations between peoples and cultures, among other things, led to the penetration of traditions for the use of drugs in new territories. So, as a result of the Crusades and the travels of Marco Polo, Europeans came to know opium and hashish, which were widespread in the East. Later, the era of great geographical discoveries and the development of new continents by Europeans introduced the civilized world to new psychoactive substances. Only the discovery of America gave the world cocaine, various hallucinogens and...

    post-image
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 92
  • 93
© 2022 DeepWeb
en
en de es pt fr