Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Why Android Users Can Now Disable 2G to block Stingray Attacks?

Why Android Users Can Now Disable 2G to block Stingray Attacks?

  • Post author:Xiarch Security
  • Post published:January 14, 2022

Google has finally rolled out an option on Android permitting…

Read more about the article Why BlueNoroff Attackers Hijack Crypto by utilizing Affected MetaMask Extension?

Why BlueNoroff Attackers Hijack Crypto by utilizing Affected MetaMask Extension?

  • Post author:Xiarch Security
  • Post published:January 14, 2022

The North Korean attacker gang known as ‘BlueNoroff’ has been…

Read more about the article How the UK jails Man for Surveillance on Youngsters, hijacking Pictures Utilizing RATs?

How the UK jails Man for Surveillance on Youngsters, hijacking Pictures Utilizing RATs?

  • Post author:Xiarch Security
  • Post published:January 13, 2022

A man from Nottingham was jailed recently for more than…

Read more about the article How do New Window Servers Updates cause DC Boot loops?

How do New Window Servers Updates cause DC Boot loops?

  • Post author:Xiarch Security
  • Post published:January 13, 2022

The new Windows Server updates are causing severe problems for…

Read more about the article Apple Fixes another Backdoor Flaw that can exhaust iPhones and iPads

Apple Fixes another Backdoor Flaw that can exhaust iPhones and iPads

  • Post author:Xiarch Security
  • Post published:January 13, 2022

Recently, Apple has released a security update to address a…

Read more about the article New Sensitive Vulnerability of Windows HTTP is Vulnerable – Microsoft

New Sensitive Vulnerability of Windows HTTP is Vulnerable – Microsoft

  • Post author:Xiarch Security
  • Post published:January 12, 2022

Microsoft has patched a sensitive bug tagged as harmful and…

Read more about the article NHS Alerts the threat actors Exploiting Log4Shell in VMware Horizon

NHS Alerts the threat actors Exploiting Log4Shell in VMware Horizon

  • Post author:Xiarch Security
  • Post published:January 12, 2022

National Health Service (NHS) of the UK has posted a…

Read more about the article How State Hackers utilize New PowerShell Backdoor in Log4j Attacks?

How State Hackers utilize New PowerShell Backdoor in Log4j Attacks?

  • Post author:Xiarch Security
  • Post published:January 12, 2022

Hackers assumed to be the part of Iranian APT35 state-backed…

Read more about the article Why Extortion DDoS Attacks Become Stronger and More Frequent?

Why Extortion DDoS Attacks Become Stronger and More Frequent?

  • Post author:Xiarch Security
  • Post published:January 11, 2022

At the end of 2021 saw an increase in the…

Read more about the article How Linux Variant of Avos Locker Ransomware Targets VMware ESXi servers?

How Linux Variant of Avos Locker Ransomware Targets VMware ESXi servers?

  • Post author:Xiarch Security
  • Post published:January 11, 2022

AvosLocker is the latest ransomware gang that has added support…

Read more about the article Rapid Window Title Reverts Causes ‘White Screen of Death’

Rapid Window Title Reverts Causes ‘White Screen of Death’

  • Post author:Xiarch Security
  • Post published:January 10, 2022

Experimentation with ANSI desertion characters on terminal emulators has led…

Read more about the article A dnspy Malware Drops a Cocktail on Developers and Researchers

A dnspy Malware Drops a Cocktail on Developers and Researchers

  • Post author:Xiarch Security
  • Post published:January 10, 2022

Attackers targeted the Cybersecurity Developers and Investigators this week in…

  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 43
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025