Black Hat Ethical Hacking
  • Home
  • Solutions
  • Courses
  • Patreon
  • Resources
    • Articles
    • InfoSec News
    • Premium Articles
    • Hacking Tools
    • Tools by BHEH
  • Merch
  • About us
  • Contact us
Select Page
APT hacking group uses double DLL sideloading to bypass security

APT hacking group uses double DLL sideloading to bypass security

May 4, 2023 | News

APT hacking group uses double DLL sideloading to bypass security Post Views: 2 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Using Complex Variations of DLL Sideloading to Evade Detection An APT hacking group, known as...
New Malware ‘LOBSHOT’ Secretly Takes Over Windows Devices via Google Ads

New Malware ‘LOBSHOT’ Secretly Takes Over Windows Devices via Google Ads

May 3, 2023 | News

New Malware ‘LOBSHOT’ Secretly Takes Over Windows Devices via Google Ads Post Views: 2 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Google Ads Used to Distribute LOBSHOT RAT Security researchers have discovered a new...
T-Mobile Discloses Second Data Breach of 2023 Affecting Hundreds of Customers

T-Mobile Discloses Second Data Breach of 2023 Affecting Hundreds of Customers

May 2, 2023 | News

T-Mobile Discloses Second Data Breach of 2023 Affecting Hundreds of Customers Post Views: 16 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Hackers Target T-Mobile Again: Second Data Breach in 2023 T-Mobile, one of the largest...
Russian hackers use fake Windows updates to target Ukrainian government

Russian hackers use fake Windows updates to target Ukrainian government

May 1, 2023 | News

Russian hackers use fake Windows updates to target Ukrainian government Post Views: 3 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes APT28 Uses Fake Windows Upgrade Emails to Target Ukrainian Government Bodies   Russian...
New macOS Malware ‘Atomic’ for Sale to Cybercriminals for $1,000 a Month

New macOS Malware ‘Atomic’ for Sale to Cybercriminals for $1,000 a Month

Apr 28, 2023 | News

New macOS Malware ‘Atomic’ for Sale to Cybercriminals for $1,000 a Month Post Views: 5 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes New ‘Atomic’ Malware Targets macOS Users for Information Theft and...
Cisco Discloses Zero-Day XSS Vulnerability in Prime Collaboration Deployment Software

Cisco Discloses Zero-Day XSS Vulnerability in Prime Collaboration Deployment Software

Apr 27, 2023 | News

Cisco Discloses Zero-Day XSS Vulnerability in Prime Collaboration Deployment Software Post Views: 1 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Cisco Zero-Day Vulnerability in Prime Collaboration Deployment Software Discovered,...
Page 86 of 100« First«...102030...8485868788...100...»Last »

Recent News

  • Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

    4 days ago
  • CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

    7 days ago
  • Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    Reprompt Attack Lets Attackers Exfiltrate Data From Microsoft Copilot With a Single Click

    2 weeks ago
  • Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

    3 weeks ago
  • Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    Actively Exploited D-Link Router Flaw Enables Unauthenticated Remote Code Execution

    4 weeks ago
  • Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    Kali Linux 2025.4 Released With 3 new tools, Desktop Overhauls, and Halloween Mode

    2 months ago
  • New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    New Phishing Kits Automate MFA Bypass, AI Email Lures, and Bank Credential Theft at Scale

    2 months ago
  • Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

    2 months ago
  • React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    React2Shell – Critical Bug Exposes React Server Components to Unauthenticated Remote Code Execution

    2 months ago
  • Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    Researchers Infiltrate Lazarus Group’s “Famous Chollima” Job-Fraud Network Using Fake Developer Laptops

    2 months ago

ABOUT US

  • Press Release
  • Sponsorship-Advertising
  • Site Map
  • Terms of Services
  • Privacy & Policy

SOLUTIONS

  • Vulnerability Assessment
  • Penetration Testing
  • Digital Forensics
  • Social Engineering
  • Compliance Programs

SUPPORT

  • Submit a Ticket
  • Report an Incident
  • Vulnerability Disclosure Policy
  • Contact us

EDUCATION

  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Courses – Login
  • Premium Articles – Login
  • Patreon – Hacking Episodes
  • Offensive Security Courses
  • Security Awareness
  • Facebook
  • X
  • Instagram
  • RSS
© Copyright 2026 • Black Hat Ethical Hacking • All rights reserved