Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Underwriters Laboratories Certification Hooked by Ransomware Attack!

Underwriters Laboratories Certification Hooked by Ransomware Attack!

  • Post author:Xiarch Security
  • Post published:February 23, 2021

UL LLC is also known as Underwriters Laboratories, which is…

Read more about the article Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card!
"Krasnodar, Russia - september 11, 2011: MasterCard Logo on credit card. Image taken with macro lens."

Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card!

  • Post author:Xiarch Security
  • Post published:February 22, 2021

Security researchers detected an updated novel attack that permits the…

Read more about the article SolarWinds Attackers Steal Source Code from Microsoft Azure, Exchange!

SolarWinds Attackers Steal Source Code from Microsoft Azure, Exchange!

  • Post author:Xiarch Security
  • Post published:February 20, 2021

Yesterday, Microsoft told that the SolarWinds attackers may download the…

Read more about the article MassLogger Trojan is Reprogrammed to Steal Outlook Chrome Credentials!

MassLogger Trojan is Reprogrammed to Steal Outlook Chrome Credentials!

  • Post author:Xiarch Security
  • Post published:February 19, 2021

On 17th Feb, a security researcher discovered that this attack…

Read more about the article Microsoft Assassinates Flash Player from Windows Devices thorough New Update!

Microsoft Assassinates Flash Player from Windows Devices thorough New Update!

  • Post author:Xiarch Security
  • Post published:February 18, 2021

Microsoft starts removing Adobe Flash Player from the Windows OS…

Read more about the article Windows 10 Secure Boot Update Execute Bit-Locker Recovery Key!

Windows 10 Secure Boot Update Execute Bit-Locker Recovery Key!

  • Post author:Xiarch Security
  • Post published:February 17, 2021

Microsoft discovered another problem faced by the Windows 10 users,…

Read more about the article ShareIT Android Application Inject Malware and Consist Many Flaws!

ShareIT Android Application Inject Malware and Consist Many Flaws!

  • Post author:Xiarch Security
  • Post published:February 17, 2021

SHAREit is one of the popular application having billion of…

Read more about the article Apple Proxy Safe Browsing to Hide iOS User’s IP from Google!

Apple Proxy Safe Browsing to Hide iOS User’s IP from Google!

  • Post author:Xiarch Security
  • Post published:February 16, 2021

The later update of Apple 14.5 comes with a new…

Read more about the article Cyberattack on Dutch Research Council that Terminates the Research Grants!

Cyberattack on Dutch Research Council that Terminates the Research Grants!

  • Post author:Xiarch Security
  • Post published:February 16, 2021

The NWO is a tasked based organization that deals with…

Read more about the article Lookout Uncovered Novel Android Spying Campaign that Linked to India Pakistan Issues!

Lookout Uncovered Novel Android Spying Campaign that Linked to India Pakistan Issues!

  • Post author:Xiarch Security
  • Post published:February 15, 2021

Lookout security team founded two Android Spying applications that include…

Read more about the article Telegram Privacy Feature Inadequate to Delete Self-Destructing Video Files!

Telegram Privacy Feature Inadequate to Delete Self-Destructing Video Files!

  • Post author:Xiarch Security
  • Post published:February 13, 2021

Telegram furnishes a Secret Chat mode that enhances the chat…

Read more about the article Yandex Dismissed an Employee who sells User’s Data Online!

Yandex Dismissed an Employee who sells User’s Data Online!

  • Post author:Xiarch Security
  • Post published:February 13, 2021

On Friday, Yandex the Russian search engine and email service…

  • Go to the previous page
  • 1
  • …
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • …
  • 43
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025