Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article A Ransomware Gang Hijacked CNA’s Network via Fake Browser Update

A Ransomware Gang Hijacked CNA’s Network via Fake Browser Update

  • Post author:Xiarch Security
  • Post published:July 23, 2021

One of the leading insurance companies CNA Financial has given…

Read more about the article Vulnerable NPM Packages Hijack Chrome Credentials on Windows using Recovery Tools

Vulnerable NPM Packages Hijack Chrome Credentials on Windows using Recovery Tools

  • Post author:Xiarch Security
  • Post published:July 22, 2021

New NPM Trojan has been discovered hijacking credentials from the…

Read more about the article Researchers Alert of Linux Cryptojacking Attackers Running from Romania

Researchers Alert of Linux Cryptojacking Attackers Running from Romania

  • Post author:Xiarch Security
  • Post published:July 19, 2021

A threat group probably situated in Romania and active since…

Read more about the article Hackers Spread New BIOPASS Malware to Live Streams Victim’s Screen

Hackers Spread New BIOPASS Malware to Live Streams Victim’s Screen

  • Post author:Xiarch Security
  • Post published:July 13, 2021

Our researchers are alerting about a new malware that’s using…

Read more about the article Nine Android Apps with 5.8 Million Installs Caught Stealing User’s Facebook Credentials

Nine Android Apps with 5.8 Million Installs Caught Stealing User’s Facebook Credentials

  • Post author:Xiarch Security
  • Post published:July 7, 2021

It is very common knowledge that applications make themselves private…

Read more about the article Alert! New Ransomware by TrickBot Botnet Found Called Diavol

Alert! New Ransomware by TrickBot Botnet Found Called Diavol

  • Post author:Xiarch Security
  • Post published:July 7, 2021

According to the latest researches, the attackers behind disgraceful TrickBot…

Read more about the article REvil Demands $70M in Kaseya Ransomware Attack by using 0-Day

REvil Demands $70M in Kaseya Ransomware Attack by using 0-Day

  • Post author:Xiarch Security
  • Post published:July 6, 2021

With the enormous supply-chain ransomware attack that provokes an infected…

Read more about the article Breached Password Services are used to Prevent Cyberattack

Breached Password Services are used to Prevent Cyberattack

  • Post author:Xiarch Security
  • Post published:June 11, 2021

Maintaining Password policies in your association is a very crucial…

Read more about the article Microsoft Address Cryptomining Attacks on Kubernetes Clusters

Microsoft Address Cryptomining Attacks on Kubernetes Clusters

  • Post author:Xiarch Security
  • Post published:June 10, 2021

Microsoft address the recent series of attacks negotiating Kubernetes cluster…

Read more about the article Using Negotiated VPN Password Hackers Breached Colonial Pipeline

Using Negotiated VPN Password Hackers Breached Colonial Pipeline

  • Post author:Xiarch Security
  • Post published:June 8, 2021

In the early last month, the ransomware gang that organizes…

Read more about the article Investigators Address of FaceFish Backdoor Expanding Linux Rootkits

Investigators Address of FaceFish Backdoor Expanding Linux Rootkits

  • Post author:Xiarch Security
  • Post published:June 1, 2021

Cybersecurity investigators have discovered a new backdoor operation efficient of…

Read more about the article Recently $40 Millions Ransom was Paid by Insurance Firm CNA Financial

Recently $40 Millions Ransom was Paid by Insurance Firm CNA Financial

  • Post author:Xiarch Security
  • Post published:May 27, 2021

Recently CNA Financial a U.S. insurance giant reportedly paid $50…

  • Go to the previous page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 11
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025