Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article How Emotet Spreads Through Fake Adobe Windows Application Installer Packages?

How Emotet Spreads Through Fake Adobe Windows Application Installer Packages?

  • Post author:Xiarch Security
  • Post published:December 2, 2021

The Emotet Trojan is now appropriated through malicious Windows App…

Read more about the article How Mozilla Fixes Critical Flaw in Cross-Platform Crypto Library?

How Mozilla Fixes Critical Flaw in Cross-Platform Crypto Library?

  • Post author:Xiarch Security
  • Post published:December 2, 2021

Mozilla recently addressed a critical memory corruption vulnerability impacting its…

Read more about the article State-backed Attackers Progressively Utilize RTF Insertion for phishing

State-backed Attackers Progressively Utilize RTF Insertion for phishing

  • Post author:Xiarch Security
  • Post published:December 1, 2021

Three APT hacking gangs from India, Russia, and China, were…

Read more about the article Android Banking Malware harms 300,000 users of Google Play

Android Banking Malware harms 300,000 users of Google Play

  • Post author:Xiarch Security
  • Post published:December 1, 2021

Malware operations distributing Android Malware that hijacks online bank passwords…

Read more about the article EwDoor Botnet Attacking AT&T Network Edge Device at US Organizations

EwDoor Botnet Attacking AT&T Network Edge Device at US Organizations

  • Post author:Xiarch Security
  • Post published:December 1, 2021

A currently discovered botnet is attacking unpatched AT&T enterprise network…

Read more about the article Stealthy WIRTE Attackers Target Governments in the Middle East

Stealthy WIRTE Attackers Target Governments in the Middle East

  • Post author:Xiarch Security
  • Post published:November 30, 2021

A stealthy hacking gang known as WRITE has been linked…

Read more about the article Cannazon Dark Web Market Closes after Enormous DDoS Attack

Cannazon Dark Web Market Closes after Enormous DDoS Attack

  • Post author:Xiarch Security
  • Post published:November 30, 2021

Cannazon, one of the largest dark Web marketplaces for buying…

Read more about the article IKEA Emails Systems hit by Current CyberAttack

IKEA Emails Systems hit by Current CyberAttack

  • Post author:Xiarch Security
  • Post published:November 29, 2021

IKEA is hostile to a current Cyberattack where the attackers…

Read more about the article Advance Windows 10 Zero-day Permit the Admin Rights, Gets Unofficial Patch

Advance Windows 10 Zero-day Permit the Admin Rights, Gets Unofficial Patch

  • Post author:Xiarch Security
  • Post published:November 29, 2021

Free unofficial patches have been updated to provide security to…

Read more about the article Discord Malware Operation Targets Crypto and NFT Associations

Discord Malware Operation Targets Crypto and NFT Associations

  • Post author:Xiarch Security
  • Post published:November 29, 2021

An advanced malware operation on Discord utilizes the Babadeda crypter…

Read more about the article How Cybercriminals Adjusted their Scams for Black Friday 2021?

How Cybercriminals Adjusted their Scams for Black Friday 2021?

  • Post author:Xiarch Security
  • Post published:November 26, 2021

Black Friday is trying, and cybercriminals are refining their malware…

Read more about the article Crafty Advance JavaScript Malware Harm Windows PCs with RATs

Crafty Advance JavaScript Malware Harm Windows PCs with RATs

  • Post author:Xiarch Security
  • Post published:November 25, 2021

An advanced stealthy JavaScript loader is also known as RATDispenser…

  • Go to the previous page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 43
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025