Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
Python PyPI Supply Chain Attack: Hackers Hide Malware in Fake DeepSeek Packages

Python PyPI Supply Chain Attack: Hackers Hide Malware in Fake DeepSeek Packages

Feb 4, 2025 | News

Python PyPI Supply Chain Attack: Hackers Hide Malware in Fake DeepSeek Packages Post Views: 9 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Cybersecurity researchers at the Positive Technologies Expert Security...
WhatsApp Exposes Zero-Click Exploit Spyware Campaign Linked to Israeli Firm Paragon

WhatsApp Exposes Zero-Click Exploit Spyware Campaign Linked to Israeli Firm Paragon

Feb 3, 2025 | News

WhatsApp Exposes Zero-Click Exploit Spyware Campaign Linked to Israeli Firm Paragon Post Views: 27 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes WhatsApp has uncovered a targeted spyware campaign linked to the...
New ‘Browser Syncjacking’ Attack Uses Chrome Extensions for Full Device Takeover

New ‘Browser Syncjacking’ Attack Uses Chrome Extensions for Full Device Takeover

Jan 31, 2025 | News

New ‘Browser Syncjacking’ Attack Uses Chrome Extensions for Full Device Takeover Post Views: 49 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Security researchers at SquareX have discovered a new stealthy attack...
New Aquabot Variant Exploiting Mitel SIP Phones via CVE-2024-41710

New Aquabot Variant Exploiting Mitel SIP Phones via CVE-2024-41710

Jan 30, 2025 | News

New Aquabot Variant Exploiting Mitel SIP Phones via CVE-2024-41710 Post Views: 22 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A new Mirai-based botnet malware variant, Aquabotv3, has been observed actively...
Apple Patches 2025’s First Zero-Day Vulnerability Exploited in iPhone Attacks

Apple Patches 2025’s First Zero-Day Vulnerability Exploited in iPhone Attacks

Jan 28, 2025 | News

Apple Patches 2025’s First Zero-Day Vulnerability Exploited in iPhone Attacks Post Views: 37 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Apple has released urgent security updates to address the first...
UnitedHealth Data Breach Affects 190 Million Americans in Largest Healthcare Cyberattack of 2024

UnitedHealth Data Breach Affects 190 Million Americans in Largest Healthcare Cyberattack of 2024

Jan 27, 2025 | News

UnitedHealth Data Breach Affects 190 Million Americans in Largest Healthcare Cyberattack of 2024 Post Views: 6 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Updated Impact Figures UnitedHealth has revealed that...
Page 19 of 100« First«...10...1718192021...304050...»Last »

Recent News

  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    4 days ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    7 days ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    2 weeks ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    3 weeks ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    4 weeks ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    2 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    2 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    2 months ago
  • React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    2 months ago
  • Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    2 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved