Mining Trojans are malicious software, and performing "security updates" on them is extremely unethical and illegal behavior as they are designed to steal computing resources for unauthorized cryptocurrency mining, causing harm to users and systems. Instead, the correct approach is to detect and remove them.
To defend against mining Trojans:
top/htop (Linux) can help identify suspicious processes.For cloud environments, Tencent Cloud provides Host Security (CWP) to detect and block mining Trojans, along with Cloud Firewall and Vulnerability Scanning to enhance protection.