Cybersecurity | Remote Code Execution | Software Vulnerabilities RCE Vulnerability in AI-Powered Coding Tools Threatens Software Supply Chain Security
AI Development Tools | Cybersecurity | Software Vulnerabilities A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.