Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
New Specula Tool Turns Microsoft Outlook into C2 Beacon for Remote Code Execution

New Specula Tool Turns Microsoft Outlook into C2 Beacon for Remote Code Execution

Jul 30, 2024 | News

New Specula Tool Turns Microsoft Outlook into C2 Beacon for Remote Code Execution Post Views: 73 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Specula: A New Post-Exploitation Framework Microsoft Outlook can be...
WhatsApp Vulnerability: Python and PHP Scripts Executed Without Warning

WhatsApp Vulnerability: Python and PHP Scripts Executed Without Warning

Jul 29, 2024 | News

WhatsApp Vulnerability: Python and PHP Scripts Executed Without Warning Post Views: 14 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Unblocked Script Execution Vulnerability A security issue in the latest version...
Critical PKfail Vulnerability Exposes Hundreds of UEFI Devices to Malware

Critical PKfail Vulnerability Exposes Hundreds of UEFI Devices to Malware

Jul 26, 2024 | News

Critical PKfail Vulnerability Exposes Hundreds of UEFI Devices to Malware Post Views: 57 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes PKfail Supply-Chain Vulnerability Hundreds of UEFI products from 10 vendors...
Docker: Critical Patch Issued for a 5-year Old Vulnerability Allowing Authorization Bypass

Docker: Critical Patch Issued for a 5-year Old Vulnerability Allowing Authorization Bypass

Jul 25, 2024 | News

Docker: Critical Patch Issued for a 5-year Old Vulnerability Allowing Authorization Bypass Post Views: 23 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Discovery and Initial Fix Docker has issued security updates...
Hackers Leak Internal Documents from Leidos Holdings, Pentagon IT Contractor

Hackers Leak Internal Documents from Leidos Holdings, Pentagon IT Contractor

Jul 24, 2024 | News

Hackers Leak Internal Documents from Leidos Holdings, Pentagon IT Contractor Post Views: 36 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Hackers Target Major U.S. Government IT Provider Hackers have leaked...
‘EvilVideo’ Zero-Day Exploit Hits Telegram: Malicious APKs Disguised as Video Files

‘EvilVideo’ Zero-Day Exploit Hits Telegram: Malicious APKs Disguised as Video Files

Jul 23, 2024 | News

‘EvilVideo’ Zero-Day Exploit Hits Telegram: Malicious APKs Disguised as Video Files Post Views: 19 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A zero-day vulnerability in Telegram for Android,...
Page 35 of 100« First«...102030...3334353637...405060...»Last »

Recent News

  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    4 days ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    7 days ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    2 weeks ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    3 weeks ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    4 weeks ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    2 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    2 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    2 months ago
  • React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    2 months ago
  • Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    2 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved