Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

Dec 15, 2025 | News

New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale Post Views: 7 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A Growing Ecosystem of Modular Phishing Kits BlackForce,...
Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

Dec 9, 2025 | News

Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers Post Views: 20 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Two malicious Visual Studio Code extensions uploaded to...
React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

Dec 4, 2025 | News

React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution Post Views: 95 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A critical, maximum-severity vulnerability...
Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

Dec 3, 2025 | News

Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops Post Views: 26 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Overview A joint investigation by BCA LTD,...
Matrix Push C2 Emerges as Browser-Based C2 Platform Using Fake Notifications for Cross-Platform Attacks

Matrix Push C2 Emerges as Browser-Based C2 Platform Using Fake Notifications for Cross-Platform Attacks

Nov 25, 2025 | News

Matrix Push C2 Emerges as Browser-Based C2 Platform Using Fake Notifications for Cross-Platform Attacks Post Views: 7 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Overview Cybercriminals have begun exploiting...
Sneaky2FA Phishing Kit Adds Browser-in-the-Browser (BitB) to Steal Microsoft 365 Sessions

Sneaky2FA Phishing Kit Adds Browser-in-the-Browser (BitB) to Steal Microsoft 365 Sessions

Nov 20, 2025 | News

Sneaky2FA Phishing Kit Adds Browser-in-the-Browser (BitB) to Steal Microsoft 365 Sessions Post Views: 2 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Overview The Sneaky2FA phishing-as-a-service (PhaaS) platform...
Page 2 of 100«12345...102030...»Last »

Recent News

  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    4 days ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    7 days ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    2 weeks ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    3 weeks ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    4 weeks ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    2 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    2 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    2 months ago
  • React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    2 months ago
  • Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    2 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved