Executive summary New research by LayerX shows how a single weaponized URL, without any malicious page content, is enough to let an attacker steal any sensitive data that has been exposed in the Comet browser. For example, if the user asked Comet to rewrite an email or schedule an appointment, the email content and meeting […]