Wu Shuo learned that security researcher 23pds warned that over the past month, phishing attackers have begun to adopt new social engineering and technical methods to target cryptocurrency users. Several related cases have been disclosed, and users should stay vigilant to avoid clicking on unknown links or signing suspicious transactions. Additionally, researcher Adam Chester revealed that a privilege escalation and command execution vulnerability was found in Anthropic's Claude Code, allowing attackers to execute commands without user authorization. The vulnerability is numbered CVE-2025-64755, and a related PoC has been made public. This issue is said to be similar to the type of vulnerabilities disclosed in the previous Cursor tool.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Wu Shuo learned that security researcher 23pds warned that over the past month, phishing attackers have begun to adopt new social engineering and technical methods to target cryptocurrency users. Several related cases have been disclosed, and users should stay vigilant to avoid clicking on unknown links or signing suspicious transactions. Additionally, researcher Adam Chester revealed that a privilege escalation and command execution vulnerability was found in Anthropic's Claude Code, allowing attackers to execute commands without user authorization. The vulnerability is numbered CVE-2025-64755, and a related PoC has been made public. This issue is said to be similar to the type of vulnerabilities disclosed in the previous Cursor tool.