Skip to navigation Skip to content
  • Links
  • About Us
  • E-Mail
  • Facebook

Computer Housecalls 123 LLC

Providing IT support for over 27 years.

  • Home
  • About Us
  • Services
    • All Services
    • Network Security
    • Virus Protection
    • Computer Repair
    • Battery Replacement
    • Data Recovery
    • Software Installation
    • MacBook Repair
  • Links
  • Contact US

Call us

+1 440 564-7021

Call us for support

12185 Kinsman Road,
Newbury, Ohio 44065, USA

Mon-Fri 9:00-5:00
Sat & Sun - closed

Computer Housecalls 123 LLC

Providing IT support for over 27 years.

Call us

+1 440 564-7021

Call us for support

12185 Kinsman Road,
Newbury, Ohio 44065, USA

Mon-Fri 9:00-5:00
Sat & Sun - closed

  • Home
  • About Us
  • Services
    • All Services
    • Network Security
    • Virus Protection
    • Computer Repair
    • Battery Replacement
    • Data Recovery
    • Software Installation
    • MacBook Repair
  • Links
  • Contact US

Month: May 2025

23 May

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web application security solution has never been greater. SafeLine is currently the most starred open-source Web Application Firewall (WAF) on GitHub, with over 16.4K stars and a rapidly growing global user base. This walkthrough covers what SafeLine is, how […]

An article by Posted in News
23 May

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it possible for attackers to compromise any user in Active Directory (AD). “The attack exploits the delegated Managed Service Account (dMSA) feature that was introduced in Windows Server 2025, works with the default configuration, and is trivial to implement,” Akamai security researcher […]

An article by Posted in News
23 May

Critical Versa Concerto Flaws Let Attackers Escape Docker and Compromise Hosts

Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network security and SD-WAN orchestration platform that could be exploited to take control of susceptible instances. It’s worth noting that the identified shortcomings remain unpatched despite responsible disclosure on February 13, 2025, prompting a public release of the issues following the end of […]

An article by Posted in News
23 May

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022. The activity has been assessed to be orchestrated by APT28 (aka BlueDelta, Fancy Bear, or Forest Blizzard), which is linked to the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, Military Unit 26165. […]

An article by Posted in News
23 May

Securing CI/CD workflows with Wazuh

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code is consistently tested, built, and deployed quickly and efficiently. While CI/CD automation accelerates software delivery, it can also introduce security risks. Without proper security measures, […]

An article by Posted in News
23 May

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts. “These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full […]

An article by Posted in News
23 May

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. “The actor creates websites that masquerade as legitimate services, productivity tools, ad and media creation or analysis assistants, VPN services, crypto, […]

An article by Posted in News
19 May

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards

Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited to access sensitive data or achieve code execution. The vulnerabilities, both of which were exploited as a zero-day at Pwn2Own Berlin, are listed below – In other words, successful exploitation of either of the flaws […]

An article by Posted in News
19 May

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. “Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks,” NSFOCUS said in a report published this week. “By […]

An article by Posted in News
13 May

China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple China-nexus nation-state actors to target critical infrastructure networks. “Actors leveraged CVE-2025-31324, an unauthenticated file upload vulnerability that enables remote code execution (RCE),” EclecticIQ researcher Arda Büyükkaya said in an analysis published today. Targets of the campaign include natural gas distribution networks, water and integrated […]

An article by Posted in News

Posts pagination

Page 1 Page 2 Next page

Recent Posts

  • Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update July 3, 2025
  • Microsoft Removes Password Management from Authenticator App Starting August 2025 July 3, 2025
  • Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign July 3, 2025
  • SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks July 3, 2025
  • New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status July 3, 2025
  • E-Mail
  • Facebook
Computer Housecalls Logo

Thank you for visiting our website. We welcome your phone calls, and are willing to help.

Our Newsletter

Address

  • 12185 Kinsman Road
    Newbury, Ohio 44065
  • +1 440 564-7021
  • service@housecalls123.com

Working hours

  • Monday 9:00 - 5:00
  • Tuesday 9:00 - 5:00
  • Wednesday 9:00 - 5:00
  • Thursday 9:00 - 5:00
  • Friday 9:00 - 5:00
  • Saturday Closed
  • Sunday Closed
© 2025 Computer Housecalls 123 LLC Privacy Policy
Scroll to top
Click to Call