UNMASKING PDF EXPLOITS: HOW HACKERS USE VULNERABILITIES TO BREACH SYSTEMS