Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
iCloud Calendar Invites Abused to Send Callback Phishing Emails via Apple Servers

iCloud Calendar Invites Abused to Send Callback Phishing Emails via Apple Servers

Sep 8, 2025 | News

iCloud Calendar Invites Abused to Send Callback Phishing Emails via Apple Servers Post Views: 17 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Abuse of iCloud Calendar Invites Threat actors are leveraging Apple’s...
Cloudflare Confirms Salesforce-Linked Data Breach via Salesloft Drift

Cloudflare Confirms Salesforce-Linked Data Breach via Salesloft Drift

Sep 3, 2025 | News

Cloudflare Confirms Salesforce-Linked Data Breach via Salesloft Drift Post Views: 7 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Breach Overview Cloudflare has confirmed that its Salesforce environment was...
Meta Patches WhatsApp Zero-Day Vulnerability Linked to Apple Zero-Day Exploit Chain

Meta Patches WhatsApp Zero-Day Vulnerability Linked to Apple Zero-Day Exploit Chain

Sep 1, 2025 | News

Meta Patches WhatsApp Zero-Day Vulnerability Linked to Apple Zero-Day Exploit Chain Post Views: 68 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Vulnerability Overview WhatsApp has patched a high-severity...
Nx Supply Chain Attack Abuses AI Tools to Steal Developer Credentials

Nx Supply Chain Attack Abuses AI Tools to Steal Developer Credentials

Aug 29, 2025 | News

Nx Supply Chain Attack Abuses AI Tools to Steal Developer Credentials Post Views: 10 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Supply Chain Attack Overview The maintainers of the Nx build system have warned...
Sni5Gect Attack Framework Can Downgrade 5G Connections Without Rogue Base Stations

Sni5Gect Attack Framework Can Downgrade 5G Connections Without Rogue Base Stations

Aug 27, 2025 | News

Sni5Gect Attack Framework Can Downgrade 5G Connections Without Rogue Base Stations Post Views: 44 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Researchers Develop Novel 5G Attack A team of academics from the...
Mac Infostealer ‘Shamos’ Spreads via ClickFix Attacks Masquerading as Help

Mac Infostealer ‘Shamos’ Spreads via ClickFix Attacks Masquerading as Help

Aug 25, 2025 | News

Mac Infostealer ‘Shamos’ Spreads via ClickFix Attacks Masquerading as Help Post Views: 22 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes New macOS Infostealer ‘Shamos’ Spreads Through...
Page 6 of 100« First«...45678...203040...»Last »

Recent News

  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    4 days ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    7 days ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    2 weeks ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    3 weeks ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    4 weeks ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    2 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    2 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    2 months ago
  • React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    2 months ago
  • Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    2 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved