#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

Secure Development | Breaking Cybersecurity News | The Hacker News

Category — Secure Development
Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

Sep 12, 2025 AI Security / Vulnerability
A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a maliciously crafted repository is opened using the program. The issue stems from the fact that an out-of-the-box security setting is disabled by default, opening the door for attackers to run arbitrary code on users' computers with their privileges. "Cursor ships with Workspace Trust disabled by default, so VS Code-style tasks configured with runOptions.runOn: 'folderOpen' auto-execute the moment a developer browses a project," Oasis Security said in an analysis. "A malicious .vscode/tasks.json turns a casual 'open folder' into silent code execution in the user's context." Cursor is an AI-powered fork of Visual Studio Code, which supports a feature called Workspace Trust to allow developers to safely browse and edit code regardless of where it came from or who wrote it. With this option disab...
Webinar: What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive

Webinar: What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive

Aug 13, 2025 Artificial Intelligence / Identity Security
The AI revolution isn't coming. It's already here. From copilots that write our emails to autonomous agents that can take action without us lifting a finger, AI is transforming how we work. But here's the uncomfortable truth: Attackers are evolving just as fast. Every leap forward in AI gives bad actors new tools — deepfake scams so real they trick your CFO, bots that can bypass human review, and synthetic identities that slip quietly into your systems. The fight is no longer at your network's edge. It's at your login screen. And that's why identity has become the last line of defense . Why This Matters Now Legacy security can't keep up. Traditional models were built for slower threats and predictable patterns. AI doesn't play by those rules. Today's attackers: Scale at machine speed. Use deepfakes to impersonate trusted people. Exploit APIs through autonomous agents. Create fake "non-human" identities that look perfectly legitimate. The only security control that can ada...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>