Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
Albert Gonzalez and the ‘Get Rich or Die Trying’ Crew who stole 130 million credit card numbers

Albert Gonzalez and the ‘Get Rich or Die Trying’ Crew who stole 130 million credit card numbers

Feb 24, 2021 | Articles, Hacking Stories

Albert Gonzalez, rose from teenage hacker to orchestrator of one of the largest credit card thefts. In 2007, with the ‘Get Rich or Die Trying’ crew, he used SQL injection to breach data from major companies, accumulating over 50 million credit card accounts.

SolarWinds Supply Chain Hack – The hack that shone a light on the gaps in the cybersecurity of governments and big companies

SolarWinds Supply Chain Hack – The hack that shone a light on the gaps in the cybersecurity of governments and big companies

Jan 18, 2021 | Articles, Malware

The SolarWinds supply chain hack severely impacted the IT infrastructure of both government and large corporate networks. The sophisticated attack exploited SolarWinds’ Orion software, impacting around 18,000 clients globally, including key US departments.

Steganography – How images can hide secret messages in plain sight

Steganography – How images can hide secret messages in plain sight

Dec 14, 2020 | Articles

Steganography is the practice of hiding secret messages in otherwise non-secret mediums. It’s different than cryptography where is the idea of encrypting a message…

Gary McKinnon and the “biggest military computer hack of all time”

Gary McKinnon and the “biggest military computer hack of all time”

Nov 16, 2020 | Articles, Hacking Stories

Gary McKinnon, a 36-year-old computer hacker, was accused of hacking into 97 computers belonging to the U.S. Army, Navy, Air Force, Department of Defense, and NASA.

The history of Internet and how it became a worldwide “thing”

The history of Internet and how it became a worldwide “thing”

Oct 12, 2020 | Free Access

The history of Internet and how it became a worldwide “thing” Post Views: 2,133 style="display:block" data-ad-client="ca-pub-6620833063853657" data-ad-slot="3193330934" data-ad-format="auto" data-full-width-responsive="true"         Reading Time: 10...
Kevin Mitnick – Once the world’s most wanted hacker, now he’s getting paid to hack companies legally

Kevin Mitnick – Once the world’s most wanted hacker, now he’s getting paid to hack companies legally

Sep 14, 2020 | Hacking Stories

Kevin Mitnick, once called the “Most-Wanted hacker”, is an American security researcher who was born in Los Angeles in 1963.

Page 18 of 19« First«...10...1516171819»

Recent News

  • State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

    State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

    3 weeks ago
  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    4 weeks ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    4 weeks ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    1 month ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    1 month ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    2 months ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    2 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    2 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    3 months ago
  • React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    3 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved