CursorJack: weaponizing Deeplinks to exploit Cursor IDE | Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/cursorjack-weaponizing-deeplinks-exploit-cursor-ide
Uncategorized
1
Posts
1
Posters
0
Views
-
CursorJack: weaponizing Deeplinks to exploit Cursor IDE | Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/cursorjack-weaponizing-deeplinks-exploit-cursor-ide
-
R relay@relay.infosec.exchange shared this topic