📢 Gate广场 #NERO发帖挑战# 秀观点赢大奖活动火热开启!
Gate NERO生态周来袭!发帖秀出NERO项目洞察和活动实用攻略,瓜分30,000NERO!
💰️ 15位优质发帖用户 * 2,000枚NERO每人
如何参与:
1️⃣ 调研NERO项目
对NERO的基本面、社区治理、发展目标、代币经济模型等方面进行研究,分享你对项目的深度研究。
2️⃣ 参与并分享真实体验
参与NERO生态周相关活动,并晒出你的参与截图、收益图或实用教程。可以是收益展示、简明易懂的新手攻略、小窍门,也可以是行情点位分析,内容详实优先。
3️⃣ 鼓励带新互动
如果你的帖子吸引到他人参与活动,或者有好友评论“已参与/已交易”,将大幅提升你的获奖概率!
NERO热门活动(帖文需附以下活动链接):
NERO Chain (NERO) 生态周:Gate 已上线 NERO 现货交易,为回馈平台用户,HODLer Airdrop、Launchpool、CandyDrop、余币宝已上线 NERO,邀您体验。参与攻略见公告:https://www.gate.com/announcements/article/46284
高质量帖子Tips:
教程越详细、图片越直观、互动量越高,获奖几率越大!
市场见解独到、真实参与经历、有带新互动者,评选将优先考虑。
帖子需原创,字数不少于250字,且需获得至少3条有效互动
Nvidia releases update for 'critical' vulnerabilities in AI stack
Technology company Nvidia released on Saturday a software update to patch vulnerabilities in its Triton server, which clients use for artificial intelligence models.
The vulnerabilities, which cybersecurity company Wiz calls “critical,” could lead to the takeover of AI models, data theft and response manipulation if not patched.
“Wiz Research found a chain of vulnerabilities that, when combined, could let an attacker with no prior access take full control of an AI server,” Wiz head of vulnerability research Nir Ohfeld told Cointelegraph.
“The attack starts with a minor bug that causes the server to leak a small piece of secret internal data,” he said. “An attacker can then use that data to trick one of the server’s legitimate features into giving them control over a private system component. This initial foothold is all they need to escalate their privileges and achieve a complete server takeover.”
Triton is an open-source inference software designed by Nvidia to optimize artificial intelligence models.
While the full scope of customers who use Triton is unknown, some big-name enterprises have been cited as employing it, including Microsoft, Amazon, Oracle, Siemens and American Express. According to a 2021 press release, over 25,000 companies use Nvidia’s AI stack.
An Nvidia spokesperson declined to comment beyond referring to the company’s security bulletin. The disclosed vulnerabilities were assigned the identifiers CVE-2025-23319, CVE-2025-23320 and CVE-2025-23334.
“The single most important step is to update to the patched version of the Nvidia Triton Inference Server (version 25.07 or newer),” Ohfeld told Cointelegraph. “This directly fixes the entire vulnerability chain.”
Ohfeld added that as of now, “we have not seen evidence of these specific vulnerabilities being exploited in the wild. However, Nvidia Triton is a very popular and widely used platform for AI workloads.”
Related: 5 smart contract vulnerabilities: How to identify and mitigate them
Security vulnerabilities hamper emerging technologies
Security vulnerabilities have hampered emerging technologies in 2025, including crypto, where exploits have led to the theft of billions of dollars worth of digital assets.
According to Hacken, a blockchain security auditor, access flaws and smart contract bugs are contributing to the $3.1 billion lost in crypto exploits in the first half of 2025. That amount already exceeds the total lost in 2024.
Meanwhile, according to some experts, AI agents and quantum computing are likely to pose new cyber threats.
Magazine: Inside Pink Drainer — Security analyst defends his crypto scam franchise