AI coding startup Cursor has introduced its latest update, Cursor 3, and it is a big shift in how software is built. Instead of developers writing every line of code, the new system allows AI agents ...
Why Sierra, Cursor, Coactive, Lovable, and ServiceNow are among Fast Company's Most Innovative Companies of 2026.
Cursor's latest Composer 2 model is based Moonshot AI's Kimi K2.5 model, confirmed the company. Cursor AI, the popular vibe coding platform, recently hit the headlines for releasing its Composer 2 ...
Credit: VentureBeat made with OpenAI GPT-Image-1.5 Cursor, a San Francisco AI coding platform from startup Anysphere valued at $29.3 billion, has launched Composer 2, a new in-house coding model now ...
Cursor, an artificial intelligence startup for coding, is in talks with investors for a funding round that would value the startup at about $50 billion, nearly double the valuation it secured last ...
On January 5, employees at Cursor returned from the holiday weekend to an all-hands meeting with a slide deck titled “War Time.” During the break, employees playing with Anthropic’s latest model, Opus ...
As agentic coding spreads, the working life of a software engineer has become dazzlingly complex. A single engineer might oversee dozens of coding agents at once, launching and guiding different ...
Cursor announced updates to its AI coding agents as the startup works to fend off competition from rivals. The updated agents can test their own changes and record their work through videos, logs and ...
VS Code forks are diverging rapidly, not just in features, but in how they structure AI-assisted development workflows. Cursor emphasizes speed and visual polish, Windsurf leans toward dynamic ...
Code editor provider Cursor has acquired Graphite, a startup with a tool that helps developers check software updates for bugs before releasing them to production. The companies announced the ...
An inherent insecurity in the increasingly popular artificial intelligence (AI)-powered developer environment Cursor allows attackers to take over its browser to deliver credential-stealing attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results