One example is the Cursor Tab and the AI command workflow. These exist as part of Cursor’s core UI and cannot be replicated ...
Researchers discovered a security weakness in the AI-powered coding tool that allows malicious MCP server to hijack Cursor's ...
A new proof-of-concept attack shows that malicious Model Context Protocol servers can inject JavaScript into Cursor’s browser ...