Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
Apple Patches 2025’s First Zero-Day Vulnerability Exploited in iPhone Attacks

Apple Patches 2025’s First Zero-Day Vulnerability Exploited in iPhone Attacks

Jan 28, 2025 | News

Apple Patches 2025’s First Zero-Day Vulnerability Exploited in iPhone Attacks Post Views: 37 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Apple has released urgent security updates to address the first...
UnitedHealth Data Breach Affects 190 Million Americans in Largest Healthcare Cyberattack of 2024

UnitedHealth Data Breach Affects 190 Million Americans in Largest Healthcare Cyberattack of 2024

Jan 27, 2025 | News

UnitedHealth Data Breach Affects 190 Million Americans in Largest Healthcare Cyberattack of 2024 Post Views: 6 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Updated Impact Figures UnitedHealth has revealed that...
Cloudflare CDN Flaw Enables Zero-Click Geo-Location Attack via Signal, Discord

Cloudflare CDN Flaw Enables Zero-Click Geo-Location Attack via Signal, Discord

Jan 23, 2025 | News

Cloudflare CDN Flaw Enables Zero-Click Geo-Location Attack via Signal, Discord Post Views: 30 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A newly discovered flaw in Cloudflare’s content delivery network...
HPE Investigates Claims of Data Breach and Source Code Disclosure by Hackers

HPE Investigates Claims of Data Breach and Source Code Disclosure by Hackers

Jan 21, 2025 | News

HPE Investigates Claims of Data Breach and Source Code Disclosure by Hackers Post Views: 16 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes HPE Investigating Claims of Data Breach by IntelBroker Hewlett Packard...
Malicious npm and PyPI Packages Steal Solana Private Keys and Delete Sensitive Data

Malicious npm and PyPI Packages Steal Solana Private Keys and Delete Sensitive Data

Jan 20, 2025 | News

Malicious npm and PyPI Packages Steal Solana Private Keys and Delete Sensitive Data Post Views: 5 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Cybersecurity researchers have identified three sets of malicious...
Severe Vulnerability in W3 Total Cache Plugin Exposes Over a Million WordPress Sites to Attacks

Severe Vulnerability in W3 Total Cache Plugin Exposes Over a Million WordPress Sites to Attacks

Jan 17, 2025 | News

Severe Vulnerability in W3 Total Cache Plugin Exposes Over a Million WordPress Sites to Attacks Post Views: 28 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A critical vulnerability in the W3 Total Cache plugin,...
Page 20 of 100« First«...10...1819202122...304050...»Last »

Recent News

  • Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

    Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

    2 weeks ago
  • State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

    State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

    2 months ago
  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    2 months ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    2 months ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    2 months ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    2 months ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    2 months ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    3 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    3 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    3 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved