Blog Post: How Computer-Using Agents Can Be Leveraged In Cyber Attacks