Skip to navigation Skip to content
  • Links
  • About Us
  • E-Mail
  • Facebook

Computer Housecalls 123 LLC

Providing IT support for over 27 years.

  • Home
  • About Us
  • Services
    • All Services
    • Network Security
    • Virus Protection
    • Computer Repair
    • Remote Help Desk Support
    • Data Recovery
    • Remote IT Onboarding & Training
    • Cybersecurity Monitoring & Incident Response
  • News
  • Links
  • Contact US

Call us

+1 440 564-7021

Call us for support

12185 Kinsman Road,
Newbury, Ohio 44065, USA

Mon-Fri 9:00-5:00
Sat & Sun - closed

Computer Housecalls 123 LLC

Providing IT support for over 27 years.

Call us

+1 440 564-7021

Call us for support

12185 Kinsman Road,
Newbury, Ohio 44065, USA

Mon-Fri 9:00-5:00
Sat & Sun - closed

  • Home
  • About Us
  • Services
    • All Services
    • Network Security
    • Virus Protection
    • Computer Repair
    • Remote Help Desk Support
    • Data Recovery
    • Remote IT Onboarding & Training
    • Cybersecurity Monitoring & Incident Response
  • News
  • Links
  • Contact US

Year: 2025

28 Jul

Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access

Cybersecurity researchers have uncovered a new stealthy backdoor concealed within the “mu-plugins” directory in WordPress sites to grant threat actors persistent access and allow them to perform arbitrary actions. Must-use plugins (aka mu-plugins) are special plugins that are automatically activated on all WordPress sites in the installation. They are located in the “wp-content/mu-plugins” directory by default. What […]

An article by Posted in News
23 Jul

Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access

Hewlett-Packard Enterprise (HPE) has released security updates to address a critical security flaw affecting Instant On Access Points that could allow an attacker to bypass authentication and gain administrative access to susceptible systems. The vulnerability, tracked as CVE-2025-37103, carries a CVSS score of 9.8 out of a maximum of 10.0. “Hard-coded login credentials were found […]

An article by Posted in News
03 Jul

Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update

Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild. The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusing flaw in the V8 JavaScript and WebAssembly engine. “Type confusion in V8 in Google Chrome prior to 138.0.7204.96 […]

An article by Posted in News
03 Jul

Microsoft Removes Password Management from Authenticator App Starting August 2025

Microsoft has said that it’s ending support for passwords in its Authenticator app starting August 1, 2025. Microsoft’s move is part of a much larger shift away from traditional password-based logins. The company said the changes are also meant to streamline autofill within its two-factor authentication (2FA) app, making the experience simpler and more secure. […]

An article by Posted in News
03 Jul

Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign for China-nexus hacking groups. The Operational Relay Box (ORB) network has been codenamed LapDogs by SecurityScorecard’s STRIKE team. “The LapDogs network has a high concentration of victims […]

An article by Posted in News
03 Jul

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it. “NetExtender enables remote users to securely connect and run applications on the company network,” SonicWall researcher Sravan Ganachari said. “Users can upload and download files, access network drives, and use […]

An article by Posted in News
03 Jul

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status

A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines. “We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality […]

An article by Posted in News
03 Jul

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors. “A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, displaying another popular social engineering technique known as Telephone-Oriented Attack Delivery (TOAD), also known as callback […]

An article by Posted in News
03 Jul

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting users’ digital assets at risk. “These extensions impersonate legitimate wallet tools from widely-used platforms such as Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox,” Koi Security researcher […]

An article by Posted in News
24 Jun

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into the login pages that harvest their credentials. Positive Technologies, in a new analysis published last week, said it identified two different kinds of keylogger code written in JavaScript on the Outlook login page – The Russian cybersecurity vendor said the […]

An article by Posted in News

Posts pagination

Previous page Page 1 … Page 11 Page 12 Page 13 … Page 16 Next page

Recent Posts

  • Microsoft: Windows 11 update causes Outlook freezes for POP users January 16, 2026
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware January 14, 2026
  • Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited January 14, 2026
  • Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control January 7, 2026
  • The Future of Cybersecurity Includes Non-Human Employees January 7, 2026
  • E-Mail
  • Facebook
Computer Housecalls Logo

Thank you for visiting our website. We welcome your phone calls, and are willing to help.

Our Newsletter

Address

  • 12185 Kinsman Road
    Newbury, Ohio 44065
  • +1 440 564-7021
  • service@housecalls123.com

Working hours

  • Monday 9:00 - 5:00
  • Tuesday 9:00 - 5:00
  • Wednesday 9:00 - 5:00
  • Thursday 9:00 - 5:00
  • Friday 9:00 - 5:00
  • Saturday Closed
  • Sunday Closed
© 2025 Computer Housecalls 123 LLC Privacy Policy
Scroll to top
Click to Call