A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Cursor's updated agents can test their own changes and record their work through videos, logs and screenshots, the company ...