How Attackers Use Corrupted Files to Slip Past Security – Waqas