Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
Massive Brute Force Attack Using 2.8 Million IPs Targets Networking Devices

Massive Brute Force Attack Using 2.8 Million IPs Targets Networking Devices

Feb 10, 2025 | News

Massive Brute Force Attack Using 2.8 Million IPs Targets Networking Devices Post Views: 5 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A large-scale brute force attack is underway, attempting to guess login...
Hackers Spoof Microsoft ADFS Login Pages to Steal Credentials and Bypass MFA

Hackers Spoof Microsoft ADFS Login Pages to Steal Credentials and Bypass MFA

Feb 6, 2025 | News

Hackers Spoof Microsoft ADFS Login Pages to Steal Credentials and Bypass MFA Post Views: 42 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A phishing campaign is targeting Microsoft Active Directory Federation...
Python PyPI Supply Chain Attack: Hackers Hide Malware in Fake DeepSeek Packages

Python PyPI Supply Chain Attack: Hackers Hide Malware in Fake DeepSeek Packages

Feb 4, 2025 | News

Python PyPI Supply Chain Attack: Hackers Hide Malware in Fake DeepSeek Packages Post Views: 9 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Cybersecurity researchers at the Positive Technologies Expert Security...
WhatsApp Exposes Zero-Click Exploit Spyware Campaign Linked to Israeli Firm Paragon

WhatsApp Exposes Zero-Click Exploit Spyware Campaign Linked to Israeli Firm Paragon

Feb 3, 2025 | News

WhatsApp Exposes Zero-Click Exploit Spyware Campaign Linked to Israeli Firm Paragon Post Views: 27 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes WhatsApp has uncovered a targeted spyware campaign linked to the...
New ‘Browser Syncjacking’ Attack Uses Chrome Extensions for Full Device Takeover

New ‘Browser Syncjacking’ Attack Uses Chrome Extensions for Full Device Takeover

Jan 31, 2025 | News

New ‘Browser Syncjacking’ Attack Uses Chrome Extensions for Full Device Takeover Post Views: 49 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Security researchers at SquareX have discovered a new stealthy attack...
New Aquabot Variant Exploiting Mitel SIP Phones via CVE-2024-41710

New Aquabot Variant Exploiting Mitel SIP Phones via CVE-2024-41710

Jan 30, 2025 | News

New Aquabot Variant Exploiting Mitel SIP Phones via CVE-2024-41710 Post Views: 22 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A new Mirai-based botnet malware variant, Aquabotv3, has been observed actively...
Page 19 of 100« First«...10...1718192021...304050...»Last »

Recent News

  • Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

    Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

    2 weeks ago
  • State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

    State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

    2 months ago
  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    2 months ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    2 months ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    2 months ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    2 months ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    2 months ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    3 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    3 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    3 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved