Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
North Korean Hackers Deploy MacOS Malware with Unseen Stealth to Hijack Crypto Firms

North Korean Hackers Deploy MacOS Malware with Unseen Stealth to Hijack Crypto Firms

Nov 8, 2024 | News

North Korean Hackers Deploy MacOS Malware with Unseen Stealth to Hijack Crypto Firms Post Views: 11 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes North Korean BlueNoroff Group Targets Crypto Businesses with New...
Winos4.0 Malware Framework Uses Gaming Apps to Infiltrate Windows Systems

Winos4.0 Malware Framework Uses Gaming Apps to Infiltrate Windows Systems

Nov 7, 2024 | News

Winos4.0 Malware Framework Uses Gaming Apps to Infiltrate Windows Systems Post Views: 39 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Hackers Deploy Winos4.0 Malware via Game-Related Apps to Target Windows Users...
CRON#TRAP Phishing Attack: A Linux VM Backdoor Hides Inside Windows Systems

CRON#TRAP Phishing Attack: A Linux VM Backdoor Hides Inside Windows Systems

Nov 5, 2024 | News

CRON#TRAP Phishing Attack: A Linux VM Backdoor Hides Inside Windows Systems Post Views: 40 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes CRON#TRAP Campaign Overview CRON#TRAP is a recent phishing attack...
New Interlock Ransomware Exploits FreeBSD servers, Demanding Huge Ransoms

New Interlock Ransomware Exploits FreeBSD servers, Demanding Huge Ransoms

Nov 4, 2024 | News

New Interlock Ransomware Exploits FreeBSD servers, Demanding Huge Ransoms Post Views: 34 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Interlock Ransomware: Targeting FreeBSD Servers in Critical Infrastructure A...
New Version of iOS Spyware LightSpy Adds Device-Disabling Capabilities

New Version of iOS Spyware LightSpy Adds Device-Disabling Capabilities

Nov 1, 2024 | News

New Version of iOS Spyware LightSpy Adds Device-Disabling Capabilities Post Views: 8 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Security researchers have discovered an enhanced version of the iOS spyware...
Opera Browser ‘CrossBarking’ Vulnerability Could Enable Full Access to Private APIs

Opera Browser ‘CrossBarking’ Vulnerability Could Enable Full Access to Private APIs

Oct 31, 2024 | News

Opera Browser ‘CrossBarking’ Vulnerability Could Enable Full Access to Private APIs Post Views: 69 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Opera’s CrossBarking Flaw: Security Vulnerability in Browser...
Page 25 of 100« First«...1020...2324252627...304050...»Last »

Recent News

  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    4 days ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    7 days ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    2 weeks ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    3 weeks ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    4 weeks ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    2 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    2 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    2 months ago
  • React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    2 months ago
  • Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    2 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved