Feed aggregator
Ghinst – Install from GitHub release section to –/.local/bin
Article URL: https://github.com/tebeka/ghinst
Comments URL: https://news.ycombinator.com/item?id=47258577
Points: 1
# Comments: 0
Restoring ReBoot from the Original Master D1 Tapes [video]
Article URL: https://www.youtube.com/watch?v=GlkJFOw-99U
Comments URL: https://news.ycombinator.com/item?id=47258573
Points: 1
# Comments: 0
Show HN: The Playwright GitHub Repositories Worth Studying
Article URL: https://testdino.com/blog/playwright-github-repositories/
Comments URL: https://news.ycombinator.com/item?id=47258508
Points: 1
# Comments: 1
Teaching Coding Agents to Drive Cmux
Article URL: https://www.bounds.dev/posts/teaching-claude-code-to-drive-cmux/
Comments URL: https://news.ycombinator.com/item?id=47258502
Points: 1
# Comments: 1
The cognitive cost of easy answers, a lesson from RL
Article URL: https://safeenough.substack.com/p/exploration-exploitation-and-thinking
Comments URL: https://news.ycombinator.com/item?id=47258501
Points: 2
# Comments: 0
Washington Post – In the Long Run, Wars Make Us Safer and Richer (2014)
The Self-Help Trap: What 20 Years of "Optimizing" Has Taught Me
Article URL: https://tim.blog/2026/03/04/the-self-help-trap/
Comments URL: https://news.ycombinator.com/item?id=47258455
Points: 5
# Comments: 0
Improving Django Admin UI with Django-unfold
Article URL: https://unfoldadmin.com/
Comments URL: https://news.ycombinator.com/item?id=47258426
Points: 2
# Comments: 1
A GB300 thread that running vLLM and SGlang on it
Article URL: https://twitter.com/xu_paco/status/2029433226234868178
Comments URL: https://news.ycombinator.com/item?id=47258419
Points: 1
# Comments: 0
Show HN: Your AI Slop Bores Me
When the LLM so ahh you lowk take over its job
Comments URL: https://news.ycombinator.com/item?id=47258418
Points: 3
# Comments: 0
Gogcli – Google in Your Terminal
Article URL: https://github.com/steipete/gogcli
Comments URL: https://news.ycombinator.com/item?id=47258389
Points: 2
# Comments: 0
Stack Overflow on AI: A Computer Weekly Downtime Upload podcast
Why a Robotics Startup's Failure Proves the Robot Starts with the Actuator
Article URL: https://www.firgelli.com/blogs/news/k-scale-labs-failure-proves-robot-starts-with-actuator
Comments URL: https://news.ycombinator.com/item?id=47257832
Points: 1
# Comments: 0
Cisco Secure Firewall Management Center Software SQL Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to perform an SQL injection attack against an affected device. To exploit this vulnerability, an attacker must have a valid account on the device with the role of Security Approver, Intrusion Admin, Access Admin, or Network Admin.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to read the contents of databases on the affected device and also obtain limited read access to the underlying operating system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inject-2EnmTC8v
This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
<br/>Security Impact Rating: Medium <br/>CVE: CVE-2024-20340Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability
A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.
This vulnerability exists because the contents of a backup file are improperly sanitized at restore time. An attacker could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as root.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmd-inj-ZJV8Wysm
For more information on the vulnerability that is described in this advisory, see Cisco Event Response: Attacks Against Cisco Firewall Platforms.
<br/>Security Impact Rating: Medium <br/>CVE: CVE-2024-20358Relicensing with AI-Assisted Rewrite
Article URL: https://tuananh.net/2026/03/05/relicensing-with-ai-assisted-rewrite/
Comments URL: https://news.ycombinator.com/item?id=47257803
Points: 1
# Comments: 0
NHS official pushed to add patient data to Palantir while advising company
Article URL: https://www.ft.com/content/6c548670-0f3e-45f1-ba08-8bb6dd152af5
Comments URL: https://news.ycombinator.com/item?id=47257792
Points: 2
# Comments: 0
Multiple Cisco Products Snort 3 Denial of Service Vulnerabilities
Multiple Cisco products are affected by vulnerabilities in the Snort 3 Detection Engine that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart, resulting in an interruption of packet inspection.
For more information about these vulnerabilities, see the Details section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-multi-dos-XFWkWSwz
This advisory is part of the March 2026 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2026 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication.
<br/>Security Impact Rating: Medium <br/>CVE: CVE-2026-20005,CVE-2026-20065,CVE-2026-20066,CVE-2026-20067,CVE-2026-20068Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software IPsec Denial of Service Vulnerability
A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to the allocation of an insufficiently sized block of memory. An attacker could exploit this vulnerability by sending crafted GCM-encrypted IPsec traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. To exploit this vulnerability, the attacker must have valid credentials to establish a VPN connection with the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-esp-dos-uv7yD8P5
This advisory is part of the March 2026 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2026 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication.
<br/>Security Impact Rating: High <br/>CVE: CVE-2026-20049Cisco Secure Firewall Adaptive Security Appliance Software Multiple Context Mode SCP Unauthorized File Access Vulnerability
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-scpcxt-filecpy-rgeP73nE
This advisory is part of the March 2026 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2026 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication.
<br/>Security Impact Rating: High <br/>CVE: CVE-2026-20062