Check Point researchers uncovered a remote code execution bug in popular vibe-coding AI tool Cursor that could allow an attacker to poison developer environments by secretly modifying a previously ...
A new report out today from artificial intelligence security startup Cyata Security Ltd. details a critical remote code ...
Security researchers from Check Point have discovered a serious vulnerability in the popular AI-based developer tool Cursor. The vulnerability allows attackers to permanently inject malicious code ...
Perplexity now works more like a personal helper than a chatbot. The company has added support for Anthropic’s Model Context Protocol (MCP), a framework that lets AI tools connect with system level ...
MCP, or Model Context Protocol, was proposed by Anthropic and is quickly becoming the industry’s standard interface between AI systems and traditional platforms. In a nutshell, it wants to be the AI ...
Due to a lack of security checks, attackers can change MCP configurations in the Cursor IDE to execute arbitrary code. In the case of the vulnerability named MCPoison by the security analysts, which ...
A new proof-of-concept attack shows that malicious Model Context Protocol servers can inject JavaScript into Cursor’s browser — and potentially leverage the IDE’s privileges to perform system tasks.
SquareX discovered hidden MCP API in Comet browser enabling arbitrary local command execution Vulnerability in Agentic extension could let attackers hijack devices via compromised perplexity.ai site ...
Enhancing the coding capabilities of Cursor AI can significantly improve your software development process. By integrating Zapier MCP servers, you gain the ability to automate tasks, connect APIs, and ...