Skip to navigation Skip to content
  • Links
  • About Us
  • E-Mail
  • Facebook

Computer Housecalls 123 LLC

Providing IT support for over 27 years.

  • Home
  • About Us
  • Services
    • All Services
    • Network Security
    • Virus Protection
    • Computer Repair
    • Remote Help Desk Support
    • Data Recovery
    • Remote IT Onboarding & Training
    • Cybersecurity Monitoring & Incident Response
  • News
  • Links
  • Contact US

Call us

+1 440 564-7021

Call us for support

12185 Kinsman Road,
Newbury, Ohio 44065, USA

Mon-Fri 9:00-5:00
Sat & Sun - closed

Computer Housecalls 123 LLC

Providing IT support for over 27 years.

Call us

+1 440 564-7021

Call us for support

12185 Kinsman Road,
Newbury, Ohio 44065, USA

Mon-Fri 9:00-5:00
Sat & Sun - closed

  • Home
  • About Us
  • Services
    • All Services
    • Network Security
    • Virus Protection
    • Computer Repair
    • Remote Help Desk Support
    • Data Recovery
    • Remote IT Onboarding & Training
    • Cybersecurity Monitoring & Incident Response
  • News
  • Links
  • Contact US

Year: 2025

12 May

ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable an attacker to leverage the software in order to achieve remote code execution. DriverHub is a tool that’s designed to automatically detect the motherboard model of a computer and display necessary driver updates for subsequent installation by communicating […]

An article by Posted in News
05 May

Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach

Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928 but emphasized there is no evidence of unauthorized data access. “This activity has affected a small number of customers we have in common with Microsoft, and we are working with those customers to provide […]

An article by Posted in News
28 Apr

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed bogus emails to be sent via Google’s infrastructure and redirect message recipients to fraudulent sites that harvest their credentials. “The first thing to note is that this is a valid, signed email – it really […]

An article by Posted in News
14 Apr

Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More

Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security tools are being hijacked to deliver malware. Even after a breach is detected and patched, some attackers stay hidden. This week’s events show a hard truth: it’s not enough to react after an attack. You have to assume […]

An article by Posted in News
10 Apr

PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

Microsoft has revealed that a now-patched security flaw impacting the Windows Common Log File System (CLFS) was exploited as a zero-day in ransomware attacks aimed at a small number of targets. “The targets include organizations in the information technology (IT) and real estate sectors of the United States, the financial sector in Venezuela, a Spanish […]

An article by Posted in News
08 Apr

Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal

Cybersecurity researchers have disclosed details of a now-patched security flaw in the Amazon EC2 Simple Systems Manager (SSM) Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution. The vulnerability could permit an attacker to create directories in unintended locations on the filesystem, execute arbitrary scripts with root privileges, […]

An article by Posted in News
31 Mar

5 Impactful AWS Vulnerabilities You’re Responsible For

If you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains the customer’s responsibility. Think of AWS security like protecting a building: AWS provides strong walls and a solid roof, but it’s up to the customer to […]

An article by Posted in News
31 Mar

Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. mu-plugins, short for must-use plugins, refers to plugins in a special directory (“wp-content/mu-plugins”) that are automatically executed by WordPress without the need to enable them explicitly via […]

An article by Posted in News
27 Mar

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, putting over 6,500 clusters at immediate risk by exposing the component to the public internet. The vulnerabilities (CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974 ), assigned a CVSS score of 9.8, have been collectively codenamed […]

An article by Posted in News
14 Mar

Apple releases emergency security update for serious vulnerability

If you own an iPhone or iPad, it’s time to stop what you’re doing and update your device.  A newly discovered security flaw, CVE-2025-24201, could leave your personal information vulnerable to hackers.  The good news? Apple has released iOS 18.3.2 and iPadOS 18.3.2 to fix the issue. Let me explain what all this means for you and how […]

An article by Posted in News

Posts pagination

Previous page Page 1 … Page 13 Page 14 Page 15 Page 16 Next page

Recent Posts

  • Microsoft: Windows 11 update causes Outlook freezes for POP users January 16, 2026
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware January 14, 2026
  • Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited January 14, 2026
  • Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control January 7, 2026
  • The Future of Cybersecurity Includes Non-Human Employees January 7, 2026
  • E-Mail
  • Facebook
Computer Housecalls Logo

Thank you for visiting our website. We welcome your phone calls, and are willing to help.

Our Newsletter

Address

  • 12185 Kinsman Road
    Newbury, Ohio 44065
  • +1 440 564-7021
  • service@housecalls123.com

Working hours

  • Monday 9:00 - 5:00
  • Tuesday 9:00 - 5:00
  • Wednesday 9:00 - 5:00
  • Thursday 9:00 - 5:00
  • Friday 9:00 - 5:00
  • Saturday Closed
  • Sunday Closed
© 2025 Computer Housecalls 123 LLC Privacy Policy
Scroll to top
Click to Call