Feed aggregator

Is there a way to sort/filter by score on Hacker News?

Hacker News - Fri, 02/20/2026 - 7:07am

New here and genuinely enjoying the signal-to-noise ratio compared to other forums. One thing I haven't been able to figure out: is there a native way to filter or sort stories by score beyond the default front page ranking? I checked the FAQ and didn't see it addressed directly. I ask because the front page algorithm weights recency heavily, and I'm looking for a way to surface the highest-quality posts over a given timeframe — not just what's new. Thanks in advance.

Comments URL: https://news.ycombinator.com/item?id=47087006

Points: 1

# Comments: 1

Categories: Hacker News

Galaxy S25 Edge vs. iPhone Air: Thin Phones Head-to-Head

CNET Feed - Fri, 02/20/2026 - 7:01am
Do you need to carry so much phone with you? Here's how the two top slim phones compare.
Categories: CNET

CISA Adds Two Known Exploited Vulnerabilities to Catalog

US-Cert Current Activity - Fri, 02/20/2026 - 7:00am

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2025-49113 RoundCube Webmail Deserialization of Untrusted Data Vulnerability
  • CVE-2025-68461 RoundCube Webmail Cross-site Scripting Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria

Categories: US-CERT Feed

Government officials from the US and Europe have condemned UN special rapporteur Francesca Albanese for remarks about Israel she never made, based on a truncated clip circulating online that takes her statements out of context

Computer Weekly Feed - Fri, 02/20/2026 - 6:41am
Government officials from the US and Europe have condemned UN special rapporteur Francesca Albanese for remarks about Israel she never made, based on a truncated clip circulating online that takes her statements out of context
Categories: Computer Weekly

Outreach domain for personalized cold emails? LLMs don't agree

Hacker News - Fri, 02/20/2026 - 6:32am

I'm starting cold emailing for my SMB SaaS. Should I use main product domain (let's say product_io) for up to 30-50 emails per day or should I use use dedicated outreach domain like e.g. getproduct_io?

Funny thing that LLMs have different opinion on this:

Sonnet 4.6:

For 50 manual personalized emails/day — yes, still use a separate domain. Here's why:

- If your product_io gets flagged/blacklisted, you lose everything — transactional emails, support, investor communication - Even manual, personalized emails can trigger spam reports. Some recipients just hit "spam" instead of "unsubscribe" or ignoring - 50/day is ~1000+/month. It only takes a small % of spam reports to hurt your domain reputation - Recovering a burned domain takes months

ChatGPT 5.2:

This advice exists for a reason, but it is often misunderstood and over-applied. In your situation, it is usually the wrong move. Let me explain clearly, without “growth hacker” myths. Why people recommend a second domain? People who send thousands of cold emails per week use burner domains because:

- they expect spam complaints, - they accept low personalization, - they rotate domains constantly, - they treat email as a volume channel.

For them, reputation damage is inevitable, so they isolate it. That is not your situation. You are doing: low volume, highly personalized, peer-to-peer outreach, to founders, with manual onboarding. This is relationship building, not “cold email marketing”. Using a throwaway domain here sends the wrong signal.

Comments URL: https://news.ycombinator.com/item?id=47086683

Points: 1

# Comments: 0

Categories: Hacker News

Pages