Hidden Threats: How Hackers Weaponize Images in Email Attacks Cyber Threats Hidden Threats: How Hackers Weaponize Images in Email Attacks