In the last few days I have done some analysis on malicious documents, especially PDF. Then I thought, “Why not turn a PDF analysis into an article?”

https://securityaffairs.co/wordpress/81044/hacking/malicious-pdf-analysis.html