Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
Critical GitHub Vulnerability Allowed Remote Code Execution via Single “git push”

Critical GitHub Vulnerability Allowed Remote Code Execution via Single “git push”

Apr 29, 2026 | News

Critical GitHub Vulnerability Allowed Remote Code Execution via Single “git push” Post Views: 82 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A critical security vulnerability affecting GitHub.com and GitHub...
Critical nginx-ui Flaw Under Active Exploitation Enables Full Server Takeover

Critical nginx-ui Flaw Under Active Exploitation Enables Full Server Takeover

Apr 16, 2026 | News

Critical nginx-ui Flaw Under Active Exploitation Enables Full Server Takeover Post Views: 25 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Critical nginx-ui Vulnerability Exploited in the Wild A newly disclosed...
React2Shell Exploited in Mass Credential Harvesting Campaign Targeting 700+ Hosts

React2Shell Exploited in Mass Credential Harvesting Campaign Targeting 700+ Hosts

Apr 3, 2026 | News

React2Shell Exploited in Mass Credential Harvesting Campaign Targeting 700+ Hosts Post Views: 16 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes React2Shell Vulnerability Exploited in Large-Scale Credential...
EvilTokens Phishing Service Fuels Large-Scale Microsoft 365 Account Takeover Campaign

EvilTokens Phishing Service Fuels Large-Scale Microsoft 365 Account Takeover Campaign

Mar 26, 2026 | News

EvilTokens Phishing Service Fuels Large-Scale Microsoft 365 Account Takeover Campaign Post Views: 21 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Large-Scale Device Code Phishing Campaign Targets Microsoft 365...
Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

Mar 10, 2026 | News

Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware Post Views: 19 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Hackers Use Microsoft Teams to Trick Employees Into Granting Remote...
State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

Feb 2, 2026 | News

State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware Post Views: 36 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes State-Sponsored Attack Hijacked Notepad++ Update Infrastructure The...
Page 1 of 10112345...102030...»Last »

Recent News

  • Critical GitHub Vulnerability Allowed Remote Code Execution via Single “git push”

    Critical GitHub Vulnerability Allowed Remote Code Execution via Single “git push”

    1 week ago
  • Critical nginx-ui Flaw Under Active Exploitation Enables Full Server Takeover

    Critical nginx-ui Flaw Under Active Exploitation Enables Full Server Takeover

    3 weeks ago
  • React2Shell Exploited in Mass Credential Harvesting Campaign Targeting 700+ Hosts

    React2Shell Exploited in Mass Credential Harvesting Campaign Targeting 700+ Hosts

    1 month ago
  • EvilTokens Phishing Service Fuels Large-Scale Microsoft 365 Account Takeover Campaign

    EvilTokens Phishing Service Fuels Large-Scale Microsoft 365 Account Takeover Campaign

    1 month ago
  • Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

    Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

    2 months ago
  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    3 months ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    3 months ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    4 months ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    4 months ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    4 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved