Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article New Malware Utilizes Windows Subsystem for Linux for Crafty Attacks

New Malware Utilizes Windows Subsystem for Linux for Crafty Attacks

  • Post author:Xiarch Security
  • Post published:September 17, 2021

Security investigators have found the malicious Linux binaries generated for…

Read more about the article FBI and CISA alert of state Hackers Exploiting Critical Zoho Flaw

FBI and CISA alert of state Hackers Exploiting Critical Zoho Flaw

  • Post author:Xiarch Security
  • Post published:September 17, 2021

The FBI, CISA, and the Coast Guard Command (CGCYBER) recently…

Read more about the article MikroTik Shares Information on Protecting Routers Hit by Massive Meris Botnet

MikroTik Shares Information on Protecting Routers Hit by Massive Meris Botnet

  • Post author:Xiarch Security
  • Post published:September 16, 2021

The Latvian network tool manufacturer MikroTik has transmitted the information…

Read more about the article Microsoft Fixes a Critical Bugs ‘OMIGOD’ in Azure Linux App

Microsoft Fixes a Critical Bugs ‘OMIGOD’ in Azure Linux App

  • Post author:Xiarch Security
  • Post published:September 16, 2021

Microsoft has tracked four critical vulnerabilities collectively called OMIGOD which…

Read more about the article Over Millions of HP OMEN Gaming PCs Affected by Driver Vulnerability

Over Millions of HP OMEN Gaming PCs Affected by Driver Vulnerability

  • Post author:Xiarch Security
  • Post published:September 15, 2021

Over millions of HP OMEN laptops and desktop gaming computers…

Read more about the article Microsoft Fixes Windows CVE-2021-40444 MSHTML Zero-day Flaw

Microsoft Fixes Windows CVE-2021-40444 MSHTML Zero-day Flaw

  • Post author:Xiarch Security
  • Post published:September 15, 2021

Microsoft recently fixed a high asperity zero-day vulnerability actively exploited…

Read more about the article FTC Alert of Extortionists Targeting LGBTQ + community on Dating Applications

FTC Alert of Extortionists Targeting LGBTQ + community on Dating Applications

  • Post author:Xiarch Security
  • Post published:September 14, 2021

The US Federal Trade Commission (FTC) alerts extortion scammers targeting…

Read more about the article Attackers Made Linux Cobalt Strike Beacon Utilized in recent Attacks

Attackers Made Linux Cobalt Strike Beacon Utilized in recent Attacks

  • Post author:Xiarch Security
  • Post published:September 14, 2021

An unauthorized Cobalt Strike Beacon Linux version made by unknown…

Read more about the article Technologies Giant Olympus hit by BlackMatter Ransomware

Technologies Giant Olympus hit by BlackMatter Ransomware

  • Post author:Xiarch Security
  • Post published:September 13, 2021

Olympus, a well-known medical technology organization, is finding a “probable…

Read more about the article Acronis True Image is now Acronis Cyber Protect Home Office!

Acronis True Image is now Acronis Cyber Protect Home Office!

  • Post author:Xiarch Security
  • Post published:September 13, 2021

After around two decades, one of the most well-known software…

Read more about the article GitHub Discovers 7 Code Execution Vulnerabilities in ‘Tar’ and Npm CLI

GitHub Discovers 7 Code Execution Vulnerabilities in ‘Tar’ and Npm CLI

  • Post author:Xiarch Security
  • Post published:September 11, 2021

GitHub security group has discovered some high-severity vulnerabilities in npm…

Read more about the article MyRepublic Reveals Data Breach disclosing Government ID cards

MyRepublic Reveals Data Breach disclosing Government ID cards

  • Post author:Xiarch Security
  • Post published:September 11, 2021

MyRepublic Singapore has revealed a data hijack disclosing the personal…

  • Go to the previous page
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • …
  • 43
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025