Feed aggregator

Linux Signalfd Is Useless

Hacker News - Wed, 03/04/2026 - 4:42pm
Categories: Hacker News

Apple's iOS 26.3.1 Brings Bug Fixes, Studio Display Support

CNET Feed - Wed, 03/04/2026 - 4:14pm
The small update arrives a few weeks after iOS 26.3 and focuses on security patches and stability improvements.
Categories: CNET

Open Claw Agentic Monitoring

Hacker News - Wed, 03/04/2026 - 4:04pm

Comments URL: https://news.ycombinator.com/item?id=47253808

Points: 1

# Comments: 0

Categories: Hacker News

Free Movies Streaming on Tubi, Pluto TV and More this March

CNET Feed - Wed, 03/04/2026 - 4:00pm
Originals and old favorites on your screen -- for free.
Categories: CNET

Today's Wordle Hints, Answer and Help for March 5, #1720

CNET Feed - Wed, 03/04/2026 - 4:00pm
Here are hints and the answer for today's Wordle for March 5, No. 1,720.
Categories: CNET

Today's NYT Connections Hints, Answers and Help for March 5, #998

CNET Feed - Wed, 03/04/2026 - 4:00pm
Here are some hints and the answers for the NYT Connections puzzle for March 5 #998.
Categories: CNET

Today's NYT Strands Hints, Answers and Help for March 5 #732

CNET Feed - Wed, 03/04/2026 - 4:00pm
Here are hints and answers for the NYT Strands puzzle for March 5, No. 732.
Categories: CNET

Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability

Cisco Security Advisories - Wed, 03/04/2026 - 4:00pm

A vulnerability in the Do Not Decrypt exclusion feature of the SSL decryption feature of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to improper memory management during the inspection of TLS 1.2 encrypted traffic. An attacker could exploit this vulnerability by sending crafted TLS 1.2 encrypted traffic through an affected device. A successful exploit could allow the attacker to cause a reload of an affected device.

Note: This vulnerability only affects traffic that is encrypted by TLS 1.2. Other versions of TLS are not affected.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dnd-dos-bpEcg7B7

This advisory is part of the March 2026 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2026 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication.

<br/>Security Impact Rating: Medium <br/>CVE: CVE-2026-20050
Categories: Cisco

At Arms over Anthropic

Hacker News - Wed, 03/04/2026 - 3:58pm
Categories: Hacker News

Show HN: I built a tamper-evident evidence system for AI agents

Hacker News - Wed, 03/04/2026 - 3:56pm

The demo loads two runs directly in your browser — no signup, no uploads, no network calls after page load.

Frank: a conservative agent. Verification returns VALID. Phil: an aggressive agent with tampered evidence. Verification returns INVALID and points to the exact line where the chain breaks.

The problem I was solving: when an AI agent does something unexpected in production, the post-mortem usually comes down to "trust our logs." I wanted evidence that could cross trust boundaries — from engineering to security, compliance, or regulators — without asking anyone to trust a dashboard.

How it works:

- Every action, policy decision, and state transition is recorded into a hash-chained NDJSON event log - Logs are sealed into evidence packs (ZIP) with manifests and signatures - A verifier (also in the demo) validates integrity offline and returns VALID / INVALID / PARTIAL with machine-readable reason codes - The same inputs always produce the same artifacts — so diffs are meaningful and replay is deterministic

The verifier and the UI are deliberately separated. The UI can be wrong. The verifier will still accept or reject based on cryptographic proof.

Built this before the recent public incidents around autonomous agents made it topical. Happy to answer questions about the architecture, the proof boundary design, or the gaps I'm still working on.

Comments URL: https://news.ycombinator.com/item?id=47253678

Points: 2

# Comments: 0

Categories: Hacker News

Pages