Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Malware Dev Impacts Own PC and Information Ends Up On Intel Platform

Malware Dev Impacts Own PC and Information Ends Up On Intel Platform

  • Post author:Xiarch Security
  • Post published:August 17, 2021

The Trojan Developer discharges their creation on their system to…

Read more about the article T-Mobile Assures Server was Hacked, Investigates Data Breach

T-Mobile Assures Server was Hacked, Investigates Data Breach

  • Post author:Xiarch Security
  • Post published:August 17, 2021

T-Mobile has assured that the threat actors hacked their servers…

Read more about the article The Ford Flaw Revealed Customers and Employee Records from Internal Systems

The Ford Flaw Revealed Customers and Employee Records from Internal Systems

  • Post author:Xiarch Security
  • Post published:August 16, 2021

A flaw on Ford Motor Company’s website permitted for accessing…

Read more about the article US Brokers Alerted of Active Phishing Attacks Act like FINRA

US Brokers Alerted of Active Phishing Attacks Act like FINRA

  • Post author:Xiarch Security
  • Post published:August 16, 2021

The US Financial Industry Regulatory Authority (FINRA) alerts US contribute…

Read more about the article Facebook Rolls out End-to-End Encryption Feature for Messenger Calls

Facebook Rolls out End-to-End Encryption Feature for Messenger Calls

  • Post author:Xiarch Security
  • Post published:August 14, 2021

Facebook revealed the rollout of end-to-end encrypted Messenger voice and…

Read more about the article How Flaws in Gym Management Software Permits Hackers Wipe Fitness History?

How Flaws in Gym Management Software Permits Hackers Wipe Fitness History?

  • Post author:Xiarch Security
  • Post published:August 14, 2021

Investigators discover that the vulnerabilities in the Wodify fitness platform…

Read more about the article Accenture reveals Hack right after LockBit Ransomware Data Leak Threats

Accenture reveals Hack right after LockBit Ransomware Data Leak Threats

  • Post author:Xiarch Security
  • Post published:August 13, 2021

Accenture, a global IT consultancy giant has supposedly been hit…

Read more about the article How the Well-Known AlphaBay Darknet Market Arrives Back in the Limelight?

How the Well-Known AlphaBay Darknet Market Arrives Back in the Limelight?

  • Post author:Xiarch Security
  • Post published:August 13, 2021

The AlphaBay darkweb market has come back in the limelight…

Read more about the article Ransomware Group Utilizes PrintNightmare to Hijack Windows Server

Ransomware Group Utilizes PrintNightmare to Hijack Windows Server

  • Post author:Xiarch Security
  • Post published:August 12, 2021

A Ransomware gang has added PrintNightmare exploits to their arsenal…

Read more about the article Microsoft Ensures another Windows Print Spooler Zero-day Flaw

Microsoft Ensures another Windows Print Spooler Zero-day Flaw

  • Post author:Xiarch Security
  • Post published:August 12, 2021

Microsoft has concerned an advisory for another zero-day Windows print…

Read more about the article Advance AdLoad Trojan Element Misstep through Apple’s XProtect defenses

Advance AdLoad Trojan Element Misstep through Apple’s XProtect defenses

  • Post author:Xiarch Security
  • Post published:August 11, 2021

A new AdLoad Trojan Element is slipping through Apple’s YARA…

Read more about the article Egregor Ransomware Gang Hijacked Information from Customers – Crytek

Egregor Ransomware Gang Hijacked Information from Customers – Crytek

  • Post author:Xiarch Security
  • Post published:August 11, 2021

Game developer and author Crytek has confirmed that the Egregor…

  • Go to the previous page
  • 1
  • …
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • 43
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025