📢 Gate广场专属 #WXTM创作大赛# 正式开启!
聚焦 CandyDrop 第59期 —— MinoTari (WXTM),总奖池 70,000 枚 WXTM 等你赢!
🎯 关于 MinoTari (WXTM)
Tari 是一个以数字资产为核心的区块链协议,由 Rust 构建,致力于为创作者提供设计全新数字体验的平台。
通过 Tari,数字稀缺资产(如收藏品、游戏资产等)将成为创作者拓展商业价值的新方式。
🎨 活动时间:
2025年8月7日 17:00 - 8月12日 24:00(UTC+8)
📌 参与方式:
在 Gate广场发布与 WXTM 或相关活动(充值 / 交易 / CandyDrop)相关的原创内容
内容不少于 100 字,形式不限(观点分析、教程分享、图文创意等)
添加标签: #WXTM创作大赛# 和 #WXTM#
附本人活动截图(如充值记录、交易页面或 CandyDrop 报名图)
🏆 奖励设置(共计 70,000 枚 WXTM):
一等奖(1名):20,000 枚 WXTM
二等奖(3名):10,000 枚 WXTM
三等奖(10名):2,000 枚 WXTM
📋 评选标准:
内容质量(主题相关、逻辑清晰、有深度)
用户互动热度(点赞、评论)
附带参与截图者优先
📄 活动说明:
内容必须原创,禁止抄袭和小号刷量行为
获奖用户需完成 Gate广场实名
Nvidia releases update for 'critical' vulnerabilities in AI stack
Technology company Nvidia released on Saturday a software update to patch vulnerabilities in its Triton server, which clients use for artificial intelligence models.
The vulnerabilities, which cybersecurity company Wiz calls “critical,” could lead to the takeover of AI models, data theft and response manipulation if not patched.
“Wiz Research found a chain of vulnerabilities that, when combined, could let an attacker with no prior access take full control of an AI server,” Wiz head of vulnerability research Nir Ohfeld told Cointelegraph.
“The attack starts with a minor bug that causes the server to leak a small piece of secret internal data,” he said. “An attacker can then use that data to trick one of the server’s legitimate features into giving them control over a private system component. This initial foothold is all they need to escalate their privileges and achieve a complete server takeover.”
Triton is an open-source inference software designed by Nvidia to optimize artificial intelligence models.
While the full scope of customers who use Triton is unknown, some big-name enterprises have been cited as employing it, including Microsoft, Amazon, Oracle, Siemens and American Express. According to a 2021 press release, over 25,000 companies use Nvidia’s AI stack.
An Nvidia spokesperson declined to comment beyond referring to the company’s security bulletin. The disclosed vulnerabilities were assigned the identifiers CVE-2025-23319, CVE-2025-23320 and CVE-2025-23334.
“The single most important step is to update to the patched version of the Nvidia Triton Inference Server (version 25.07 or newer),” Ohfeld told Cointelegraph. “This directly fixes the entire vulnerability chain.”
Ohfeld added that as of now, “we have not seen evidence of these specific vulnerabilities being exploited in the wild. However, Nvidia Triton is a very popular and widely used platform for AI workloads.”
Related: 5 smart contract vulnerabilities: How to identify and mitigate them
Security vulnerabilities hamper emerging technologies
Security vulnerabilities have hampered emerging technologies in 2025, including crypto, where exploits have led to the theft of billions of dollars worth of digital assets.
According to Hacken, a blockchain security auditor, access flaws and smart contract bugs are contributing to the $3.1 billion lost in crypto exploits in the first half of 2025. That amount already exceeds the total lost in 2024.
Meanwhile, according to some experts, AI agents and quantum computing are likely to pose new cyber threats.
Magazine: Inside Pink Drainer — Security analyst defends his crypto scam franchise