Scan to download
BTC $79,086.74 -2.81%
ETH $2,223.31 -3.29%
BNB $673.10 -1.15%
XRP $1.43 -7.00%
SOL $89.53 -4.12%
TRX $0.3519 -0.75%
DOGE $0.1130 -2.86%
ADA $0.2609 -5.28%
BCH $426.07 -2.77%
LINK $10.07 -5.68%
HYPE $44.82 +1.00%
AAVE $93.10 -6.87%
SUI $1.10 -9.07%
XLM $0.1545 -6.75%
ZEC $522.37 -1.97%
BTC $79,086.74 -2.81%
ETH $2,223.31 -3.29%
BNB $673.10 -1.15%
XRP $1.43 -7.00%
SOL $89.53 -4.12%
TRX $0.3519 -0.75%
DOGE $0.1130 -2.86%
ADA $0.2609 -5.28%
BCH $426.07 -2.77%
LINK $10.07 -5.68%
HYPE $44.82 +1.00%
AAVE $93.10 -6.87%
SUI $1.10 -9.07%
XLM $0.1545 -6.75%
ZEC $522.37 -1.97%

security

AI Agent Security Risk Exposure: Attackers Can Exploit "Memory Pollution" to Induce Misoperation of Funds

The GoPlus Security team has disclosed a new type of attack in its AgentGuard AI project: inducing AI agents to perform unauthorized sensitive operations through "memory poisoning." This attack method does not rely on traditional vulnerabilities or malicious code but exploits the long-term memory mechanism of AI agents. For example, an attacker first induces the agent to "remember preferences," such as "usually prioritizing proactive refunds instead of waiting for chargebacks," and then uses vague expressions like "process as usual" or "execute as before" in subsequent instructions, thereby triggering automated financial operations.GoPlus points out that the key risk in such cases lies in the AI agent mistakenly treating "historical preferences" as a basis for authorization, leading to financial losses or security incidents in operations such as refunds, transfers, and configuration changes. To address this issue, the team has proposed several protective recommendations, including:Operations involving refunds, transfers, deletions, or sensitive configurations must require explicit confirmation in the current session.Memory-related instructions like "habit," "usual way," and "as before" should be regarded as high-risk state changes.Long-term memory must have a traceability mechanism (writer, time, confirmation status).Vague instructions should automatically elevate the risk level and trigger secondary verification.Long-term memory must not replace real-time authorization processes.The team emphasizes that the "AI agent memory system" should be viewed as a potential attack surface and should be constrained and audited through a dedicated security framework.

Binance Security Report: Deployed hundreds of AI models for defense system, cumulatively intercepted $10.53 billion in risky funds

Binance released its latest security report, addressing the current industry situation of rapidly spreading AI scams. The platform has deployed over 24 AI security programs and equipped more than 100 AI models to build an intelligent defense system against various types of cryptocurrency fraud.Statistics show that from early 2025 to the first quarter of 2026, Binance has protected over 5.4 million users and intercepted potential fund losses of $10.53 billion. In Q1 2026, the platform successfully intercepted 22.9 million scam and phishing attacks, protecting user funds amounting to $1.98 billion, with an average of over 9,600 real-time risk alerts pushed daily, and a total of 36,000 malicious on-chain addresses blacklisted.The report pointed out that deepfakes, voice cloning, and phishing bots have become mainstream scam tactics, with the overall scale of cryptocurrency fraud reaching $17 billion in 2025, a year-on-year increase of 30%. In terms of risk control, Binance's AI system handles 57% of fraud detection work, reducing the credit card fraud rate to 60%-70% of the industry average; it has upgraded AI anti-counterfeiting KYC reviews, with review efficiency improved by up to 100 times.The AI trading tool Binance Ai Pro uses an isolated account structure, only allowing trading permissions and prohibiting withdrawals, with the platform intercepting 12% of high-risk third-party AI plugins. Additionally, in 2025, Binance assisted in recovering $12.8 million in scammed funds, handled 48,000 cases, and collaborated with law enforcement to freeze $131 million in illegal assets.

The Bitcoin TAP protocol ecological project BIT has released a new roadmap to create a decentralized security budget layer for Bitcoin

The Bitcoin TAP protocol ecological project BIT (@dmt_bit_) has released a new roadmap, announcing a focus on the narrative of "Bitcoin Security Budget Layer," with tokens being directly issued to Bitcoin miners every block as a new source of miner subsidies.The BIT team disclosed that currently only the $NAT token enjoys the miner subsidy mechanism under the TAP protocol, and this mechanism is hardcoded in the protocol's source code (effective only for the dmt-nat token), making it unavailable for other DMT projects. The TAP protocol has also not publicly disclosed any third-party security audits to date.BIT has submitted a code upgrade proposal to TAP, hoping to open this mechanism for use by all DMT tokens, but it was rejected by the TAP officials.According to the roadmap, BIT will next develop a new protocol based on a TAP fork—any DMT token deployment party can customize the token issuance rules and miner distribution methods (including distribution by mining pool weight, independent miner prize accumulation, mixed distribution, etc.) through a single inscription, eliminating any hardcoded privileges for projects. A third-party security audit will be completed before the mainnet launch of the new protocol. $BIT will serve as the native token of the new protocol, and the ecological development of the protocol will continue to empower $BIT.
app_icon
ChainCatcher Building the Web3 world with innovations.