Hackers are mixing cache smuggling with identity theft and phishing to bypass protections and deploy malware.