A new proof-of-concept attack shows that malicious Model Context Protocol servers can inject JavaScript into Cursor’s browser — and potentially leverage the IDE’s privileges to perform system tasks.
The Browser MCP (Model Context Protocol) server, when paired with Cursor, provides a comprehensive platform for automating browser tasks and testing web applications. By combining browser navigation, ...
Coplay opens public beta to all developers, expanding beyond its invite-only model. Now stewarding the Unity MCP server, Coplay deepens support for open-source game dev tools. Orchestrator Mode debuts ...
A new report out today from artificial intelligence security startup Cyata Security Ltd. details a critical remote code ...
Enhancing the coding capabilities of Cursor AI can significantly improve your software development process. By integrating Zapier MCP servers, you gain the ability to automate tasks, connect APIs, and ...
Security researchers from Check Point have discovered a serious vulnerability in the popular AI-based developer tool Cursor. The vulnerability allows attackers to permanently inject malicious code ...
An inherent insecurity in the increasingly popular artificial intelligence (AI)-powered developer environment Cursor allows attackers to take over its browser to deliver credential-stealing attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results