Cursor 2.0 introduces its own AI coding model, Composer, and a new interface for parallel work with multiple agents.
The npm packages were available since July, have elaborately obfuscated malicious routines, and rely on a fake CAPTCHA to ...
The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest ...
For the past four months, over 130 malicious NPM packages deploying information stealers have been collectively downloaded ...