SOC Analyst Training: How to Analyze Malicious PDFs