Skip to navigation Skip to content
  • Links
  • About Us
  • E-Mail
  • Facebook

Computer Housecalls 123 LLC

Providing IT support for over 27 years.

  • Home
  • About Us
  • Services
    • All Services
    • Network Security
    • Virus Protection
    • Computer Repair
    • Remote Help Desk Support
    • Data Recovery
    • Remote IT Onboarding & Training
    • Cybersecurity Monitoring & Incident Response
  • News
  • Links
  • Contact US

Call us

+1 440 564-7021

Call us for support

12185 Kinsman Road,
Newbury, Ohio 44065, USA

Mon-Fri 9:00-5:00
Sat & Sun - closed

Computer Housecalls 123 LLC

Providing IT support for over 27 years.

Call us

+1 440 564-7021

Call us for support

12185 Kinsman Road,
Newbury, Ohio 44065, USA

Mon-Fri 9:00-5:00
Sat & Sun - closed

  • Home
  • About Us
  • Services
    • All Services
    • Network Security
    • Virus Protection
    • Computer Repair
    • Remote Help Desk Support
    • Data Recovery
    • Remote IT Onboarding & Training
    • Cybersecurity Monitoring & Incident Response
  • News
  • Links
  • Contact US

Category: News

22 Dec

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

WatchGuard has released fixes to address a critical security flaw in Fireware OS that it said has been exploited in real-world attacks. Tracked as CVE-2025-14733 (CVSS score: 9.3), the vulnerability has been described as a case of out-of-bounds write affecting the iked process that could allow a remote unauthenticated attacker to execute arbitrary code. “This vulnerability affects […]

An article by Posted in News
22 Dec

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting governmental entities in Southeast Asia and Japan. The end goal of these attacks is cyber espionage, Slovak cybersecurity company ESET said in a report published today. The threat activity cluster has been assessed to be active since […]

An article by Posted in News
22 Dec

HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

Hewlett Packard Enterprise (HPE) has resolved a maximum-severity security flaw in OneView Software that, if successfully exploited, could result in remote code execution. The critical vulnerability, assigned the CVE identifier CVE-2025-37164, carries a CVSS score of 10.0. HPE OneView is an IT infrastructure management software that streamlines IT operations and controls all systems via a centralized dashboard interface. […]

An article by Posted in News
22 Dec

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

Cisco has alerted users to a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686 in attacks targeting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. The networking equipment major said it became aware of the intrusion campaign on […]

An article by Posted in News
17 Dec

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are no longer available. These […]

An article by Posted in News
15 Dec

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering called VolkLocker that suffers from implementation lapses in test artifacts, allowing users to decrypt files without paying an extortion fee. According to SentinelOne, VolkLocker (aka CyberVolk 2.x) emerged in August 2025 and is capable of targeting both Windows and Linux […]

An article by Posted in News
13 Dec

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that it said have been exploited in the wild, one of which is the same flaw that was patched by Google in Chrome earlier this week. The vulnerabilities are listed below – Apple said […]

An article by Posted in News
13 Dec

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating credential theft at scale. BlackForce, first detected in August 2025, is designed to steal credentials and perform Man-in-the-Browser (MitB) attacks to capture one-time passwords (OTPs) and bypass multi-factor authentication (MFA). The kit is sold on Telegram forums […]

An article by Posted in News
13 Dec

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

The React team has released fixes for two new types of flaws in React Server Components (RSC) that, if successfully exploited, could result in denial-of-service (DoS) or source code exposure. The team said the issues were found by the security community while attempting to exploit the patches released for CVE-2025-55182 (CVSS score: 10.0), a critical bug in […]

An article by Posted in News
13 Dec

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation. The critical vulnerability, tracked as CVE-2025-55182 (CVSS score: 10.0), affects the React Server Components (RSC) Flight protocol. The underlying cause of the issue is an unsafe deserialization that allows an attacker to inject malicious […]

An article by Posted in News

Posts pagination

Previous page Page 1 Page 2 Page 3 Page 4 … Page 18 Next page

Recent Posts

  • Microsoft: Windows 11 update causes Outlook freezes for POP users January 16, 2026
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware January 14, 2026
  • Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited January 14, 2026
  • Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control January 7, 2026
  • The Future of Cybersecurity Includes Non-Human Employees January 7, 2026
  • E-Mail
  • Facebook
Computer Housecalls Logo

Thank you for visiting our website. We welcome your phone calls, and are willing to help.

Our Newsletter

Address

  • 12185 Kinsman Road
    Newbury, Ohio 44065
  • +1 440 564-7021
  • service@housecalls123.com

Working hours

  • Monday 9:00 - 5:00
  • Tuesday 9:00 - 5:00
  • Wednesday 9:00 - 5:00
  • Thursday 9:00 - 5:00
  • Friday 9:00 - 5:00
  • Saturday Closed
  • Sunday Closed
© 2025 Computer Housecalls 123 LLC Privacy Policy
Scroll to top
Click to Call