
Introduction In an era where cyberattacks are increasingly sophisticated, a staggering number of malicious activities are delivered through seemingly innocuous PDF files, which have become a favored vehicle for malware distribution, credential phishing, and business email compromise (BEC) attacks. This pervasive threat underscores the urgent need for innovative tools to detect and neutralize dangers hidden within a format trusted by










