thumbnail Zero-Day: How Attackers Use Corrupted Files to Bypass Detection