The Justice Department today announced a multinational operation involving actions in the United States, France, Germany, the Netherlands, the United Kingdom, Romania, and Latvia to disrupt the botnet and malware known as Qakbot and take down its infrastructure. 
On August 29th, 2023, the FBI provided Have I Been Pwned (HIBP) with 6.43M email addresses to help notify impacted victims of their exposure to the Qakbot malware. Anyone may check to see if their email address is included in the list of victims of the Qakbot malware via the HIBP notification service.
We recommend that everyone subscribes to the free notification service provided by Have I Been Pwned (HIBP) which can notify you if your email address is found in certain data breaches, including being in the Qakbot data.
Qakbot relied on compromised accounts to spread its malicious emails. If a receiver interacted with one of these emails, it is highly likely that their device became infected. As a result, they would have become part of the Qakbot botnet. 
If you find that your email address is in the Qakbot data, meaning your computer was probably infected with the malware, you should take several actions, including resetting your email password, and resetting any other passwords that were used on the infected computer (banking, shopping, etc.). Also, it’s possible your computer is infected with other additional malware, it should be scanned by a reputable antivirus/anti-malware product such as Malwarebytes or Windows Defender. Since Qakbot targets, among other things, banking/financial details, you should carefully review bank statements for unauthorized transactions and report any you find to your financial institution.
The Mirai malware botnet is actively exploiting a TP-Link Archer A21 (AX1800) WiFi router vulnerability tracked as CVE-2023-1389 to incorporate devices into DDoS (distributed denial of service) swarms.
This post is only applicable to customers who have their domain’s email hosted on our Plesk hosting servers _AND_ (at least sometimes) access their email using the Horde webmail application. Note that most hosting customers use Outlook or Thunderbird to access their email, and do not regularly use webmail.
Multiple Netgear router models contain vulnerabilities that a remote attacker can exploit to take control of an affected device. Widomaker does not provide Netgear routers with our service, however, many of our customers may have purchased one, themselves, to use with their Internet service. If you are using one of the affected Netgear models, you should update or replace the device, immediately. Please continue reading to determine if your Netgear router model is affected…
Note: Updates will be added to the bottom of this post. On, 6/6/2018, additional router models were added to the list of affected devices.
It’s important that all Internet users take action to secure their Internet router to avoid very real negative consequences. The items below briefly describe what steps are necessary. For those who are uncomfortable with any of the steps, after step number one, please contact Widomaker, a local computer shop, or the Support Department of the manufacturer of your Internet router, for guidance.
Attention: All website hosting customers who use the WordPress content management system on their websites, please see below…
On Oct 16 2017 US-CERT released Vulnerability Note VU#228519 after researchers disclosed “serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks.” They have named the proof-of-concept exploits, KRACK (key reinstallation attacks)…
The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. […] To prevent the attack, users must update affected products as soon as security updates become available.
On, October 2, 2017, vulnerabilities (US-CERT VU#973527) were made public, by Google’s security team, in Dnsmasq, a widely used software package included in many Internet-connected devices, such as routers, IoT devices, and Android devices. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.