Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article What are the new Emotet Spam Operations Hitting Mailboxes across the World?

What are the new Emotet Spam Operations Hitting Mailboxes across the World?

  • Post author:Xiarch Security
  • Post published:November 17, 2021

The Emotet malware kicked into action in recent days after…

Read more about the article NPM fixes private package names leak, Serious Authorization Flaw

NPM fixes private package names leak, Serious Authorization Flaw

  • Post author:Xiarch Security
  • Post published:November 17, 2021

The largest software registry of Node.js packages, npm, has disclosed…

Read more about the article Advance Rowhammer Tactics Avoid Existing of DDR4 Memory Defenses

Advance Rowhammer Tactics Avoid Existing of DDR4 Memory Defenses

  • Post author:Xiarch Security
  • Post published:November 17, 2021

Investigators have set up an advance fuzzing-based tactics called “Blacksmith”…

Read more about the article QBot returns for an Advance wave of Adversaries by utilizing Squirrelwaffle

QBot returns for an Advance wave of Adversaries by utilizing Squirrelwaffle

  • Post author:Xiarch Security
  • Post published:November 15, 2021

The activity of the QBot (also known as Quakbot) banking…

Read more about the article FBI System Hijacked to Email ‘Immediate’ Alert About Fake Cyberattacks

FBI System Hijacked to Email ‘Immediate’ Alert About Fake Cyberattacks

  • Post author:Xiarch Security
  • Post published:November 15, 2021

The Federal Bureau of Investigations (FBI) email servers were hijacked…

Read more about the article AMD fixes Multiple Windows 10 Graphic Driver Security Flaws

AMD fixes Multiple Windows 10 Graphic Driver Security Flaws

  • Post author:Xiarch Security
  • Post published:November 12, 2021

AMD has resolved a long list of security vulnerabilities found…

Read more about the article Gmail Account is Utilized in 91% of all Baiting Email Attacks

Gmail Account is Utilized in 91% of all Baiting Email Attacks

  • Post author:Xiarch Security
  • Post published:November 12, 2021

Bail attacks are on the rise, and it comes that…

Read more about the article Magniber Ransomware Group now Exploits Internet Explorer Bugs in Attacks

Magniber Ransomware Group now Exploits Internet Explorer Bugs in Attacks

  • Post author:Xiarch Security
  • Post published:November 11, 2021

The Magniber ransomware group is currently using more than one…

Read more about the article Android Spyware Operations targeting South Korean Users ‘PhoneSpy’
A green android figure stands on a laptop on a programming code screen. View through a magnifying glass. July 2020. Kiev, Ukraine

Android Spyware Operations targeting South Korean Users ‘PhoneSpy’

  • Post author:Xiarch Security
  • Post published:November 11, 2021

A currently going spyware named “PhoneSpy” targets South Korean users…

Read more about the article Criminal group Broken after forcing Victims to be Money Mules

Criminal group Broken after forcing Victims to be Money Mules

  • Post author:Xiarch Security
  • Post published:November 10, 2021

The Spanish police have arrested around 45 people who are…

Read more about the article NUCLEUS:13 TCP Security flaw affects the Critical Healthcare devices

NUCLEUS:13 TCP Security flaw affects the Critical Healthcare devices

  • Post author:Xiarch Security
  • Post published:November 10, 2021

Investigators recently published information about a suite of 13 vulnerabilities…

Read more about the article Google will Stop Chrome Sync Support on Chrome 48 and Earlier

Google will Stop Chrome Sync Support on Chrome 48 and Earlier

  • Post author:Xiarch Security
  • Post published:November 9, 2021

Google will end support for the Chrome sync feature for…

  • Go to the previous page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 43
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025