An inherent insecurity in the increasingly popular artificial intelligence (AI)-powered developer environment Cursor allows attackers to take over its browser to deliver credential-stealing attacks.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results