BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Tags
  3. /steganography

Tag: steganography

highVulnerabilities & Exploits

Multi-Stage Threats: Wormable Cryptominers, Steganographic Malware, and LLM Infrastructure Risks

Researchers documented a sophisticated wormable XMRig cryptomining campaign using BYOVD exploits and time-based logic bombs distributed through pirated software. Meanwhile, malicious JPEG files continue embedding payloads via steganography, and organizations deploying LLMs face increased risks from exposed endpoints and expanded API attack surfaces.

Feb 23, 2026The Hacker News, SANS ISC
cryptojackingxmrigsteganography
mediumData Breaches & Incidents

Steganography Strikes: Malware Hidden in Images Targets Enterprise Systems

Three separate campaigns demonstrate advanced steganographic malware deployment: XWorm 7.2 in Excel files, Pulsar RAT in NPM packages, and critical password manager vulnerabilities.

Feb 23, 2026Hackread
steganographymalwaresupply-chain
mediumMalware & Threats

AI Assistants Exploited for Covert Command-and-Control Communications

Researchers demonstrate how AI assistants with web browsing capabilities can be abused as intermediaries for malware command-and-control communications, bypassing traditional detection.

Feb 18, 2026BleepingComputer
command-and-controlai-abusesteganography