Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
  • Merch
  • About us
  • Contact us
Select Page
Can Outsourcing Actually Save You Money?

Can Outsourcing Actually Save You Money?

Nov 4, 2025 | Articles

Discover how outsourcing can truly save your business money while improving efficiency, accessing expert skills, and boosting productivity.

Network Eavesdropping via Man-in-the-Middle on Internal Communications

Network Eavesdropping via Man-in-the-Middle on Internal Communications

Oct 31, 2025 | Articles, Internal Pentesting Write ups

During an internal penetration testing, our team discovered that internal network communications were vulnerable to eavesdropping through a man-in-the-middle (MiTM) attack.

How Penetration Testing Supports DORA Compliance for Financial and ICT Entities

How Penetration Testing Supports DORA Compliance for Financial and ICT Entities

Sep 16, 2025 | Articles, Information Security

Learn how penetration testing supports DORA (Digital Operational Resilience Act) compliance for financial institutions and ICT providers.

OS Command Injection via ‘lang’ Parameter in Fortinet VPN SSL Interface

OS Command Injection via ‘lang’ Parameter in Fortinet VPN SSL Interface

Sep 2, 2025 | Articles, External Pentesting Write ups

During an external pentesting, a critical OS Command Injection vulnerability was identified by our team in a Fortinet SSL VPN web interface, specifically through manipulation of the lang (language) parameter.

Cyber Kill Chain’s phases: Understanding the cycle of a cyber attack

Cyber Kill Chain’s phases: Understanding the cycle of a cyber attack

Aug 15, 2025 | Articles

Discover the Cyber Kill Chain model—a strategic framework that breaks down cyber attacks into seven key phases. Learn how organizations can detect, prevent, and respond to threats more effectively by understanding each stage, from reconnaissance to execution

How to Start a Career in Cybersecurity (Offensive Security Edition)

How to Start a Career in Cybersecurity (Offensive Security Edition)

Aug 15, 2025 | Articles

Discover how to launch a successful career in offensive cybersecurity with this in-depth guide. Learn key fundamentals, certifications, hands-on training, and how to build a standout portfolio in ethical hacking.

Page 1 of 1912345...10...»Last »

Recent News

  • React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    13 hours ago
  • Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    2 days ago
  • Matrix Push C2 Emerges as Browser-Based C2 Platform Using Fake Notifications for Cross-Platform Attacks

    Matrix Push C2 Emerges as Browser-Based C2 Platform Using Fake Notifications for Cross-Platform Attacks

    1 week ago
  • Sneaky2FA Phishing Kit Adds Browser-in-the-Browser (BitB) to Steal Microsoft 365 Sessions

    Sneaky2FA Phishing Kit Adds Browser-in-the-Browser (BitB) to Steal Microsoft 365 Sessions

    2 weeks ago
  • New ClickFix Campaign “EVALUSION” Deploys Amatera Stealer and NetSupport RAT

    New ClickFix Campaign “EVALUSION” Deploys Amatera Stealer and NetSupport RAT

    2 weeks ago
  • Maverick Malware Campaign Expands: WhatsApp-Propagated Banking Trojan Linked to Coyote

    Maverick Malware Campaign Expands: WhatsApp-Propagated Banking Trojan Linked to Coyote

    3 weeks ago
  • Hotel Managers Targeted by ClickFix Phishing – PureRAT Used to Harvest Booking.com Credentials

    Hotel Managers Targeted by ClickFix Phishing – PureRAT Used to Harvest Booking.com Credentials

    3 weeks ago
  • Freight Brokers Hit by RMM-Based Cyber Attacks Aimed at Physical Cargo Theft

    Freight Brokers Hit by RMM-Based Cyber Attacks Aimed at Physical Cargo Theft

    1 month ago
  • AdaptixC2: Open-Source C2 Tool Gains Traction with Ransomware-Linked Actors

    AdaptixC2: Open-Source C2 Tool Gains Traction with Ransomware-Linked Actors

    1 month ago
  • Nearly 76,000 WatchGuard Firebox Appliances Exposed — Critical IKEv2 RCE (CVE-2025-9242)

    Nearly 76,000 WatchGuard Firebox Appliances Exposed — Critical IKEv2 RCE (CVE-2025-9242)

    1 month ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2025 • Black Hat Ethical Hacking • All rights reserved