📢 Gate廣場 #NERO发帖挑战# 秀觀點贏大獎活動火熱開啓!
Gate NERO生態周來襲!發帖秀出NERO項目洞察和活動實用攻略,瓜分30,000NERO!
💰️ 15位優質發帖用戶 * 2,000枚NERO每人
如何參與:
1️⃣ 調研NERO項目
對NERO的基本面、社區治理、發展目標、代幣經濟模型等方面進行研究,分享你對項目的深度研究。
2️⃣ 參與並分享真實體驗
參與NERO生態周相關活動,並曬出你的參與截圖、收益圖或實用教程。可以是收益展示、簡明易懂的新手攻略、小竅門,也可以是行情點位分析,內容詳實優先。
3️⃣ 鼓勵帶新互動
如果你的帖子吸引到他人參與活動,或者有好友評論“已參與/已交易”,將大幅提升你的獲獎概率!
NERO熱門活動(帖文需附以下活動連結):
NERO Chain (NERO) 生態周:Gate 已上線 NERO 現貨交易,爲回饋平台用戶,HODLer Airdrop、Launchpool、CandyDrop、餘幣寶已上線 NERO,邀您體驗。參與攻略見公告:https://www.gate.com/announcements/article/46284
高質量帖子Tips:
教程越詳細、圖片越直觀、互動量越高,獲獎幾率越大!
市場見解獨到、真實參與經歷、有帶新互動者,評選將優先考慮。
帖子需原創,字數不少於250字,且需獲得至少3條有效互動
Nvidia releases update for 'critical' vulnerabilities in AI stack
Technology company Nvidia released on Saturday a software update to patch vulnerabilities in its Triton server, which clients use for artificial intelligence models.
The vulnerabilities, which cybersecurity company Wiz calls “critical,” could lead to the takeover of AI models, data theft and response manipulation if not patched.
“Wiz Research found a chain of vulnerabilities that, when combined, could let an attacker with no prior access take full control of an AI server,” Wiz head of vulnerability research Nir Ohfeld told Cointelegraph.
“The attack starts with a minor bug that causes the server to leak a small piece of secret internal data,” he said. “An attacker can then use that data to trick one of the server’s legitimate features into giving them control over a private system component. This initial foothold is all they need to escalate their privileges and achieve a complete server takeover.”
Triton is an open-source inference software designed by Nvidia to optimize artificial intelligence models.
While the full scope of customers who use Triton is unknown, some big-name enterprises have been cited as employing it, including Microsoft, Amazon, Oracle, Siemens and American Express. According to a 2021 press release, over 25,000 companies use Nvidia’s AI stack.
An Nvidia spokesperson declined to comment beyond referring to the company’s security bulletin. The disclosed vulnerabilities were assigned the identifiers CVE-2025-23319, CVE-2025-23320 and CVE-2025-23334.
“The single most important step is to update to the patched version of the Nvidia Triton Inference Server (version 25.07 or newer),” Ohfeld told Cointelegraph. “This directly fixes the entire vulnerability chain.”
Ohfeld added that as of now, “we have not seen evidence of these specific vulnerabilities being exploited in the wild. However, Nvidia Triton is a very popular and widely used platform for AI workloads.”
Related: 5 smart contract vulnerabilities: How to identify and mitigate them
Security vulnerabilities hamper emerging technologies
Security vulnerabilities have hampered emerging technologies in 2025, including crypto, where exploits have led to the theft of billions of dollars worth of digital assets.
According to Hacken, a blockchain security auditor, access flaws and smart contract bugs are contributing to the $3.1 billion lost in crypto exploits in the first half of 2025. That amount already exceeds the total lost in 2024.
Meanwhile, according to some experts, AI agents and quantum computing are likely to pose new cyber threats.
Magazine: Inside Pink Drainer — Security analyst defends his crypto scam franchise