🎉 Hey Gate Square friends! Non-stop perks and endless excitement—our hottest posting reward events are ongoing now! The more you post, the more you win. Don’t miss your exclusive goodies! 🚀
🆘 #Gate 2025 Semi-Year Community Gala# | Square Content Creator TOP 10
Only 1 day left! Your favorite creator is one vote away from TOP 10. Interact on Square to earn Votes—boost them and enter the prize draw. Prizes: iPhone 16 Pro Max, Golden Bull sculpture, Futures Vouchers!
Details 👉 https://www.gate.com/activities/community-vote
1️⃣ #Show My Alpha Points# | Share your Alpha points & gains
Post your
Hacker continues to scout TeleMessage vulnerabilities, with multiple attack attempts already.
Odaily News According to a report by GreyNoise, hackers are still trying to exploit the CVE-2025-48927 vulnerability in the TeleMessage application. So far, 11 IP addresses have attempted attacks, and over 2000 IPs have conducted reconnaissance activities. The vulnerability involves the Spring Boot Actuator component, allowing access to the heapdump endpoint and extraction of system data without verification. TeleMessage has stated that the vulnerability has been fixed, but the progress of the fix may vary depending on conditions. (cointelegraph)