Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Attackers Made Linux Cobalt Strike Beacon Utilized in recent Attacks

Attackers Made Linux Cobalt Strike Beacon Utilized in recent Attacks

  • Post author:Xiarch Security
  • Post published:September 14, 2021

An unauthorized Cobalt Strike Beacon Linux version made by unknown…

Read more about the article GitHub Discovers 7 Code Execution Vulnerabilities in ‘Tar’ and Npm CLI

GitHub Discovers 7 Code Execution Vulnerabilities in ‘Tar’ and Npm CLI

  • Post author:Xiarch Security
  • Post published:September 11, 2021

GitHub security group has discovered some high-severity vulnerabilities in npm…

Read more about the article How Threat Actors Hijack Credentials for 500,000 Fortinet VPN Accounts

How Threat Actors Hijack Credentials for 500,000 Fortinet VPN Accounts

  • Post author:Xiarch Security
  • Post published:September 10, 2021

An attacker has exposed a list of around 500,000 Fortinet…

Read more about the article Advance Meris Botnet Breaks DDoS record with 21.8 Million of RPS Attack

Advance Meris Botnet Breaks DDoS record with 21.8 Million of RPS Attack

  • Post author:Xiarch Security
  • Post published:September 10, 2021

An advance distributed denial-of-service (DDoS) botnet that preserved extending over…

Read more about the article Learn – How Yandex is fighting the Largest DDoS in Russian Internet History?

Learn – How Yandex is fighting the Largest DDoS in Russian Internet History?

  • Post author:Xiarch Security
  • Post published:September 9, 2021

Yandex a Russian Internet Giant Yandex has been addressed in…

Read more about the article Know how Cybercriminals Exploit Windows Zero-Day Flaw: Microsoft

Know how Cybercriminals Exploit Windows Zero-Day Flaw: Microsoft

  • Post author:Xiarch Security
  • Post published:September 9, 2021

One of the reliable and dangerous bugs is being harmed…

Read more about the article Microsoft Shares Ordinary Fix for Current Office 365 zero-day Attacks

Microsoft Shares Ordinary Fix for Current Office 365 zero-day Attacks

  • Post author:Xiarch Security
  • Post published:September 8, 2021

Recently, Microsoft shared mitigation for remote code execution vulnerability in…

Read more about the article Netgear fixes Server Security Flaws in over a Dozen Smart Switches!

Netgear fixes Server Security Flaws in over a Dozen Smart Switches!

  • Post author:Xiarch Security
  • Post published:September 7, 2021

Netgear has posted a firmware release for more than a…

Read more about the article Here is the New Malware Campaign’s ‘Windows 11 Alpha’ Attachment!

Here is the New Malware Campaign’s ‘Windows 11 Alpha’ Attachment!

  • Post author:Xiarch Security
  • Post published:September 6, 2021

Awaiting a simple recipe that has verified a successful time…

Read more about the article Due to Code Execution Bug, Google’s TensorFlow drops YAML Support!

Due to Code Execution Bug, Google’s TensorFlow drops YAML Support!

  • Post author:Xiarch Security
  • Post published:September 6, 2021

A well-known Python-based machine learning and artificial intelligence project known…

Read more about the article Conti Ransomware Now targeting Exchange Servers with ProxyShell Exploits

Conti Ransomware Now targeting Exchange Servers with ProxyShell Exploits

  • Post author:Xiarch Security
  • Post published:September 4, 2021

The Conti Ransomware Group is now targeting Microsoft Exchange servers…

Read more about the article How Hackers Sells Tool to Hide Malware in AMD, NVIDIA GPUs?

How Hackers Sells Tool to Hide Malware in AMD, NVIDIA GPUs?

  • Post author:Xiarch Security
  • Post published:September 1, 2021

Cybercriminals are creating strides against attacks with malware that can…

  • Go to the previous page
  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025