Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article How Phishing Emails are Spreading the Sophisticated Malware?

How Phishing Emails are Spreading the Sophisticated Malware?

  • Post author:Xiarch Security
  • Post published:March 22, 2021

A new phishing email campaign was spotted by the FBI…

Read more about the article New Attack that Authorizes the Attackers to Track the Users with the help of JavaScript!

New Attack that Authorizes the Attackers to Track the Users with the help of JavaScript!

  • Post author:Xiarch Security
  • Post published:March 19, 2021

The security researcher and multiple law enforcement agencies have discovered…

Read more about the article Microsoft Launched One-Click Mitigation Tool to Revoke Exchange Attacks!

Microsoft Launched One-Click Mitigation Tool to Revoke Exchange Attacks!

  • Post author:Xiarch Security
  • Post published:March 19, 2021

On Monday, Microsoft released a one-click mitigation tool that takes…

Read more about the article Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!

Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!

  • Post author:Xiarch Security
  • Post published:March 19, 2021

Another vulnerability was discovered in Zoom’s screen sharing feature that…

Read more about the article New Updated CopperStealer Malware Hijacks Apple, Facebook, and Google Account Data!

New Updated CopperStealer Malware Hijacks Apple, Facebook, and Google Account Data!

  • Post author:Xiarch Security
  • Post published:March 19, 2021

After the investigation, the malware is spotted who is distributed…

Read more about the article Apple Started Updating Security Patch From Other OS Updates!

Apple Started Updating Security Patch From Other OS Updates!

  • Post author:Xiarch Security
  • Post published:March 18, 2021

Apple is going to update its methods while delivering the…

Read more about the article How Twitter Images can be Misused While Hiding MP3, ZIP Files?

How Twitter Images can be Misused While Hiding MP3, ZIP Files?

  • Post author:Xiarch Security
  • Post published:March 18, 2021

On 17th March 2021, the security researcher identified a method…

Read more about the article New POC Microsoft Exchange Bug That Enhances New Attacks!

New POC Microsoft Exchange Bug That Enhances New Attacks!

  • Post author:Xiarch Security
  • Post published:March 16, 2021

Another proof of concept has been released that discovered the…

Read more about the article Researchers Recognized Another Malware Written in Nim Programming Language!

Researchers Recognized Another Malware Written in Nim Programming Language!

  • Post author:Xiarch Security
  • Post published:March 15, 2021

The security researcher discovered another email campaign that was initiated…

Read more about the article Scammers Distributes Fake Cryptocurrency Giveaways through Twitter Ads!

Scammers Distributes Fake Cryptocurrency Giveaways through Twitter Ads!

  • Post author:Xiarch Security
  • Post published:March 15, 2021

Attackers are now using the Promoted tweets on Twitter to…

Read more about the article Researchers Reveals the New Linux Malware is Connected to Chinese Hackers!

Researchers Reveals the New Linux Malware is Connected to Chinese Hackers!

  • Post author:Xiarch Security
  • Post published:March 15, 2021

On 10th March 2021, the cybersecurity researcher said that they…

Read more about the article New DEARCRY Ransomware Attack is Now Targeting Microsoft Exchange Servers!

New DEARCRY Ransomware Attack is Now Targeting Microsoft Exchange Servers!

  • Post author:Xiarch Security
  • Post published:March 15, 2021

Attackers are now using a new ransomware attack named DEARCRY…

  • Go to the previous page
  • 1
  • …
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • …
  • 43
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025