#Gate 2025 Semi-Year Community Gala# voting is in progress! 🔥
Gate Square TOP 40 Creator Leaderboard is out
🙌 Vote to support your favorite creators: www.gate.com/activities/community-vote
Earn Votes by completing daily [Square] tasks. 30 delivered Votes = 1 lucky draw chance!
🎁 Win prizes like iPhone 16 Pro Max, Golden Bull Sculpture, Futures Voucher, and hot tokens.
The more you support, the higher your chances!
Vote to support creators now and win big!
https://www.gate.com/announcements/article/45974
Hacker continues to scout TeleMessage vulnerabilities, with multiple attack attempts already.
Odaily News According to a report by GreyNoise, hackers are still trying to exploit the CVE-2025-48927 vulnerability in the TeleMessage application. So far, 11 IP addresses have attempted attacks, and over 2000 IPs have conducted reconnaissance activities. The vulnerability involves the Spring Boot Actuator component, allowing access to the heapdump endpoint and extraction of system data without verification. TeleMessage has stated that the vulnerability has been fixed, but the progress of the fix may vary depending on conditions. (cointelegraph)