BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Tags
  3. /malware-campaigns

Tag: malware-campaigns

highVulnerabilities & Exploits

Multi-Stage Threats: Wormable Cryptominers, Steganographic Malware, and LLM Infrastructure Risks

Researchers documented a sophisticated wormable XMRig cryptomining campaign using BYOVD exploits and time-based logic bombs distributed through pirated software. Meanwhile, malicious JPEG files continue embedding payloads via steganography, and organizations deploying LLMs face increased risks from exposed endpoints and expanded API attack surfaces.

Feb 23, 2026The Hacker News, SANS ISC
cryptojackingxmrigsteganography