Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Know How Hackers Hijacked Google Docs Data using Send Feedback Bug?

Know How Hackers Hijacked Google Docs Data using Send Feedback Bug?

  • Post author:Xiarch Security
  • Post published:December 30, 2020

Google furnishes a "Send Feedback" option for Google Docs, Google…

Read more about the article Wondering How Cyber Assault Happens using VBA Purging? Read This

Wondering How Cyber Assault Happens using VBA Purging? Read This

  • Post author:Xiarch Security
  • Post published:December 29, 2020

The new threat is found in malicious Office documents that…

Read more about the article How Things Will Change After Windows 10 Zero-Day Exploit 2020?

How Things Will Change After Windows 10 Zero-Day Exploit 2020?

  • Post author:Xiarch Security
  • Post published:December 24, 2020

Microsoft Windows 10 Zero-Day Exploit 2020 is now disclosed publicly.…

Read more about the article Why Safe-Inet and Insorg VPN Providers are Banned? Know Reasons Why They Don’t Work!

Why Safe-Inet and Insorg VPN Providers are Banned? Know Reasons Why They Don’t Work!

  • Post author:Xiarch Security
  • Post published:December 23, 2020

The blustery news coming out from the law enforcement agencies,…

  • Go to the previous page
  • 1
  • …
  • 8
  • 9
  • 10
  • 11

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025