Analysis of malicious documents – Bonus blog post – More recent techniques in attacks with malicious documents