Documents and images are the vector of choice for cyber criminals to use for malware, ransomware attacks and malicious exploits. From Web browsing and email, to portal uploads and social media, these files are routinely embedded with known, zero-day and even totally undetectable threats concealed in the files we use every hour of the working day.