Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article BEC Scammers are Start Targeting Investors from Big Payouts!

BEC Scammers are Start Targeting Investors from Big Payouts!

  • Post author:Xiarch Security
  • Post published:March 6, 2021

BEC stands for Business Email Compromise is now adopting new…

Read more about the article Google Fixed Another Zero-Day Exploit Active in Google Chrome!

Google Fixed Another Zero-Day Exploit Active in Google Chrome!

  • Post author:Xiarch Security
  • Post published:March 6, 2021

Google had fixed another active zero-day exploit present in Chrome…

Read more about the article How Gootkit Rat Use SEO to Distribute Malware Using Compromised Sites?

How Gootkit Rat Use SEO to Distribute Malware Using Compromised Sites?

  • Post author:Xiarch Security
  • Post published:March 6, 2021

An updated framework is used by the attackers while delivering…

Read more about the article World Leading Dairy Group Hit by CyberAttack – Lactalis International

World Leading Dairy Group Hit by CyberAttack – Lactalis International

  • Post author:Xiarch Security
  • Post published:March 3, 2021

Another cyber attack was reported, this time attackers targeted the…

Read more about the article What are Google GVT1.com URLs? Read this to know!

What are Google GVT1.com URLs? Read this to know!

  • Post author:Xiarch Security
  • Post published:March 3, 2021

Google has multiple domains that caused several malicious problems that…

Read more about the article Microsoft Resolved Windows 10 Drive Corruption Bug – Read this to know!

Microsoft Resolved Windows 10 Drive Corruption Bug – Read this to know!

  • Post author:Xiarch Security
  • Post published:March 1, 2021

Microsoft fixed the Windows 10 bug that corrupts the hard…

Read more about the article How Hackers Employ Phishing Attacks using Zoom?

How Hackers Employ Phishing Attacks using Zoom?

  • Post author:Xiarch Security
  • Post published:March 1, 2021

In the period of the pandemic, businesses are facing multiple…

Read more about the article Dutch Research Council NWO Discovered Ransomware Attack that Leaks Confidential Data!

Dutch Research Council NWO Discovered Ransomware Attack that Leaks Confidential Data!

  • Post author:Xiarch Security
  • Post published:February 26, 2021

In the recent cyberattack that was forced to shut down…

Read more about the article Russian Hackers Connected with Attacks that Targets Ukrainian Government!

Russian Hackers Connected with Attacks that Targets Ukrainian Government!

  • Post author:Xiarch Security
  • Post published:February 25, 2021

National Security and Defense Council of Ukraine has attached to…

Read more about the article APT 32 Attackers Start Targeting Human Rights Defenders using Spyware!

APT 32 Attackers Start Targeting Human Rights Defenders using Spyware!

  • Post author:Xiarch Security
  • Post published:February 25, 2021

The hacker group named APT 32 start targeting Vietnamese HRDs…

Read more about the article New Malware Infect 30,000 Macs for Unknown Purpose!

New Malware Infect 30,000 Macs for Unknown Purpose!

  • Post author:Xiarch Security
  • Post published:February 23, 2021

Silver Sparrow new malware discovered that infects around 30,000 Mac…

Read more about the article Alert: Google Warned About Fake Adobe Flash Player Update!
Alert: Google Warned About Fake Adobe Flash Player Update!

Alert: Google Warned About Fake Adobe Flash Player Update!

  • Post author:Xiarch Security
  • Post published:February 23, 2021

Hackers are misusing Google alerts while promoting a Fraud Adobe…

  • Go to the previous page
  • 1
  • …
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • …
  • 43
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025