I'm not saying a fake 8-K would be filed via pdf, I'm saying the most likely way a hacker got access via Edgar is by having a zero day exploit in a pdf file. Doesn't matter if is a primary document. The pdf format was the trojan horse.
Pretty certain they were already scanning for Java code in HTML. That leaves pdf.
Know What You Own. My posts should not be construed as investment advice.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.