Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
North Korean Hackers Deploy MacOS Malware with Unseen Stealth to Hijack Crypto Firms

North Korean Hackers Deploy MacOS Malware with Unseen Stealth to Hijack Crypto Firms

Nov 8, 2024 | News

North Korean Hackers Deploy MacOS Malware with Unseen Stealth to Hijack Crypto Firms Post Views: 11 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes North Korean BlueNoroff Group Targets Crypto Businesses with New...
Winos4.0 Malware Framework Uses Gaming Apps to Infiltrate Windows Systems

Winos4.0 Malware Framework Uses Gaming Apps to Infiltrate Windows Systems

Nov 7, 2024 | News

Winos4.0 Malware Framework Uses Gaming Apps to Infiltrate Windows Systems Post Views: 39 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Hackers Deploy Winos4.0 Malware via Game-Related Apps to Target Windows Users...
CRON#TRAP Phishing Attack: A Linux VM Backdoor Hides Inside Windows Systems

CRON#TRAP Phishing Attack: A Linux VM Backdoor Hides Inside Windows Systems

Nov 5, 2024 | News

CRON#TRAP Phishing Attack: A Linux VM Backdoor Hides Inside Windows Systems Post Views: 40 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes CRON#TRAP Campaign Overview CRON#TRAP is a recent phishing attack...
New Interlock Ransomware Exploits FreeBSD servers, Demanding Huge Ransoms

New Interlock Ransomware Exploits FreeBSD servers, Demanding Huge Ransoms

Nov 4, 2024 | News

New Interlock Ransomware Exploits FreeBSD servers, Demanding Huge Ransoms Post Views: 34 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Interlock Ransomware: Targeting FreeBSD Servers in Critical Infrastructure A...
New Version of iOS Spyware LightSpy Adds Device-Disabling Capabilities

New Version of iOS Spyware LightSpy Adds Device-Disabling Capabilities

Nov 1, 2024 | News

New Version of iOS Spyware LightSpy Adds Device-Disabling Capabilities Post Views: 8 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Security researchers have discovered an enhanced version of the iOS spyware...
Opera Browser ‘CrossBarking’ Vulnerability Could Enable Full Access to Private APIs

Opera Browser ‘CrossBarking’ Vulnerability Could Enable Full Access to Private APIs

Oct 31, 2024 | News

Opera Browser ‘CrossBarking’ Vulnerability Could Enable Full Access to Private APIs Post Views: 69 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Opera’s CrossBarking Flaw: Security Vulnerability in Browser...
Page 26 of 101« First«...1020...2425262728...405060...»Last »

Recent News

  • Critical GitHub Vulnerability Allowed Remote Code Execution via Single “git push”

    Critical GitHub Vulnerability Allowed Remote Code Execution via Single “git push”

    1 week ago
  • Critical nginx-ui Flaw Under Active Exploitation Enables Full Server Takeover

    Critical nginx-ui Flaw Under Active Exploitation Enables Full Server Takeover

    3 weeks ago
  • React2Shell Exploited in Mass Credential Harvesting Campaign Targeting 700+ Hosts

    React2Shell Exploited in Mass Credential Harvesting Campaign Targeting 700+ Hosts

    1 month ago
  • EvilTokens Phishing Service Fuels Large-Scale Microsoft 365 Account Takeover Campaign

    EvilTokens Phishing Service Fuels Large-Scale Microsoft 365 Account Takeover Campaign

    1 month ago
  • Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

    Attackers Impersonate IT Support on Microsoft Teams to Deploy A0Backdoor Malware

    2 months ago
  • State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

    State-Sponsored Attack Hijacks Notepad++ Update Infrastructure to Deliver Malware

    3 months ago
  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    3 months ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    3 months ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    4 months ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    4 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved