80 articles tagged with #vulnerability. AI-curated summaries with sentiment analysis and key takeaways from 50+ sources.
AIBearisharXiv – CS AI · Mar 47/103
🧠Researchers have developed SemBD, a new semantic-level backdoor attack against text-to-image diffusion models that achieves 100% success rate while evading current defenses. The attack uses continuous semantic regions as triggers rather than fixed textual patterns, making it significantly harder to detect and defend against.
AIBearisharXiv – CS AI · Mar 37/104
🧠Researchers have identified critical security vulnerabilities in Computer-Use Agents (CUAs) through Visual Prompt Injection attacks, where malicious instructions are embedded in user interfaces. Their VPI-Bench study shows CUAs can be deceived at rates up to 51% and Browser-Use Agents up to 100% on certain platforms, with current defenses proving inadequate.
CryptoBearishU.Today · Feb 277/105
⛓️Ledger's CTO and other experts are warning that quantum computers could eventually become powerful enough to break Elliptic Curve cryptography, which would pose a significant threat to cryptocurrency security. This emerging risk highlights a potential vulnerability in current blockchain infrastructure that could impact the entire crypto ecosystem.
$CRV
AI × CryptoNeutralCoinTelegraph – AI · Feb 277/105
🤖The XRPL Foundation successfully patched a critical vulnerability in the Ripple blockchain codebase before it reached mainnet deployment. An AI bug hunter identified the security flaw during code scanning, allowing engineers to fix the issue proactively.
$XRP
AIBearisharXiv – CS AI · Feb 277/105
🧠Researchers discovered a new vulnerability called 'silent egress' where LLM agents can be tricked into leaking sensitive data through malicious URL previews without detection. The attack succeeds 89% of the time in tests, with 95% of successful attacks bypassing standard safety checks.
AIBearisharXiv – CS AI · Feb 277/107
🧠Researchers discovered a vulnerability in AI music and video generation systems where phonetic prompts can bypass copyright filters. The 'Adversarial PhoneTic Prompting' attack achieves 91% similarity to copyrighted content by using sound-alike phrases that preserve acoustic patterns while evading text-based detection.
$NEAR$APT
AI × CryptoBearishDL News · Feb 257/103
🤖Octane Security's AI tool discovered a high-severity bug in Nethermind, a software client that runs the Ethereum blockchain. This represents a significant security vulnerability in critical Ethereum infrastructure that could potentially impact network operations.
$ETH
AI × CryptoBearishWu Blockchain · Feb 227/103
🤖Base is moving away from the Optimism Superchain by integrating key network components into its own unified codebase. Additionally, Moonwell suffered a security breach due to vulnerabilities in AI-generated code.
$OP
AI × CryptoBearishDL News · Feb 197/108
🤖OpenAI has released a new crypto security tool following a costly incident where AI-generated code from Claude caused a $2.7 million bug that affected Moonwell users. The timing suggests a response to growing concerns about AI-generated code vulnerabilities in cryptocurrency applications.
AINeutralOpenAI News · Nov 77/107
🧠Prompt injections represent a significant security vulnerability in AI systems, requiring specialized research and countermeasures. OpenAI is actively developing safeguards and training methods to protect users from these frontier attacks.
CryptoNeutralEthereum Foundation Blog · May 77/103
⛓️CVE-2025-30147 identifies a security vulnerability related to subgroup checks in the Besu Ethereum client. The issue was discovered through collaborative efforts between security researchers and the Besu development team, with proper testing and confirmation processes in place.
CryptoNeutralEthereum Foundation Blog · Mar 217/103
⛓️A security threat that existed on the Ethereum network from the Merge until the Dencun hard fork has been disclosed, with the vulnerability specifically manifesting during the Sepolia incident. The disclosure highlights a previously unknown attack vector that could have potentially compromised network security during this critical period.
$ETH
CryptoNeutralEthereum Foundation Blog · May 187/102
⛓️This article discloses a severe security threat that affected the Ethereum platform until the Berlin hardfork was implemented. The vulnerability represented a clear and present danger to the network's stability and security before being resolved through the protocol upgrade.
$ETH
CryptoBearishEthereum Foundation Blog · Nov 127/102
⛓️Geth has released a critical security update to address vulnerabilities in the Ethereum client software. Users are strongly advised to upgrade immediately to protect their nodes from potential exploits.
CryptoBearishEthereum Foundation Blog · Mar 267/102
⛓️A critical bug was discovered in Solidity's optimizer and ABIEncoderV2 that could affect smart contract security and functionality. The vulnerability impacts contracts using specific optimization settings and encoding features, potentially leading to unexpected behavior or security risks.
CryptoBearishEthereum Foundation Blog · Jan 157/102
⛓️Ethereum's Constantinople hard fork was postponed on January 15, 2019, after ChainSecurity identified potential security vulnerabilities. The Ethereum Core Developers and Security Community are investigating the issues and will provide updates through official channels.
$ETH
CryptoNeutralEthereum Foundation Blog · May 37/101
⛓️A bug in the Solidity optimizer was discovered and reported through the Ethereum Foundation Bounty program by Christoph Jentzsch. The vulnerability has been patched with the release of Solidity version 0.4.11 on May 3, 2017.
$ETH
DeFiBearishEthereum Foundation Blog · Nov 17/101
💎A critical security vulnerability affects Solidity compiler versions 0.1.6 to 0.4.3, allowing storage variables smaller than 256 bits to overwrite other variables when packed together. This bug could lead to unexpected behavior and potential security exploits in smart contracts compiled with these versions.
CryptoBearishEthereum Foundation Blog · Oct 277/101
⛓️Mist browser has security vulnerabilities that expose low-level APIs, allowing malicious DApps to access users' file systems and potentially read or delete files. Users are strongly advised to upgrade Mist immediately to protect against these exploits when navigating to untrusted decentralized applications.
CryptoBearishEthereum Foundation Blog · Oct 137/101
⛓️Ethereum is implementing a hard fork with EIP150 gas cost changes in response to sustained network attacks over recent weeks. The attackers exploited vulnerabilities in client implementations and protocol specifications, prompting this emergency protocol update.
$ETH
CryptoBearishEthereum Foundation Blog · Sep 187/101
⛓️A critical security vulnerability affects Geth nodes, causing them to crash due to out-of-memory errors when processing block 2283416. This high-severity issue has been addressed in Geth version 1.4.12.
CryptoBearishEthereum Foundation Blog · Jun 287/101
⛓️A high-severity DoS vulnerability has been discovered in geth 1.4.8's implementation of the DAO soft fork. The vulnerability allows attackers to execute EVM code up to the block gas limit without payment, creating a potential denial of service attack vector.
CryptoBearishEthereum Foundation Blog · Jun 247/101
⛓️The Ethereum ecosystem faced significant challenges following The DAO incident, highlighting the complexity of writing secure smart contracts and the difficulty of reaching consensus on major protocol decisions. The article discusses the ongoing debate around implementing a soft-fork solution to address the DAO vulnerability.
$ETH
CryptoBearishEthereum Foundation Blog · Jun 247/101
⛓️Smart contract wallets created using Ethereum Wallet Frontier version 0.4.0 (Beta 7) or earlier are vulnerable to phishing attacks. Wallets created with version 0.5.0 and later (released after March 3, 2016) are not affected, though the vulnerability has low likelihood but high severity.
$ETH
CryptoBearishEthereum Foundation Blog · May 177/101
⛓️A critical security vulnerability has been discovered in Geth and potentially other Ethereum clients that allows remote attackers to perform DoS attacks and stall the synchronization process. While the likelihood of exploitation is very low, the severity is high, prompting immediate updates for all Go client versions.