📢 #Gate Square Writing Contest Phase 3# is officially kicks off!
🎮 This round focuses on: Yooldo Games (ESPORTS)
✍️ Share your unique insights and join promotional interactions. To be eligible for any reward, you must also participate in Gate’s Phase 286 Launchpool, CandyDrop, or Alpha activities!
💡 Content creation + airdrop participation = double points. You could be the grand prize winner!
💰Total prize pool: 4,464 $ESPORTS
🏆 First Prize (1 winner): 964 tokens
🥈 Second Prize (5 winners): 400 tokens each
🥉 Third Prize (10 winners): 150 tokens each
🚀 How to participate:
1️⃣ Publish an
Hacker continues to scout TeleMessage vulnerabilities, with multiple attack attempts already.
Odaily News According to a report by GreyNoise, hackers are still trying to exploit the CVE-2025-48927 vulnerability in the TeleMessage application. So far, 11 IP addresses have attempted attacks, and over 2000 IPs have conducted reconnaissance activities. The vulnerability involves the Spring Boot Actuator component, allowing access to the heapdump endpoint and extraction of system data without verification. TeleMessage has stated that the vulnerability has been fixed, but the progress of the fix may vary depending on conditions. (cointelegraph)