Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Canada Acknowledge 7,300 More Applications due to Technical Flaws

Canada Acknowledge 7,300 More Applications due to Technical Flaws

  • Post author:Xiarch Security
  • Post published:August 31, 2021

A flaw in the Canadian immigration system led to the…

Read more about the article Different Products Affected by OpenSSL RCE Vulnerability: Synology

Different Products Affected by OpenSSL RCE Vulnerability: Synology

  • Post author:Xiarch Security
  • Post published:August 27, 2021

A Taiwan-based NAS maker Synology has recently disclosed that remote…

Read more about the article New Security Patches Released by F5 for BIG-IP and BIG-IQ Devices

New Security Patches Released by F5 for BIG-IP and BIG-IQ Devices

  • Post author:Xiarch Security
  • Post published:August 27, 2021

The BIG-IP application services company F5 had fixed more than…

Read more about the article Researchers Uncovers FIN8 Cybercrime Group Backdoors US Orgs with New Sardonic Trojan

Researchers Uncovers FIN8 Cybercrime Group Backdoors US Orgs with New Sardonic Trojan

  • Post author:Xiarch Security
  • Post published:August 26, 2021

A commercially motivated cybercrime group has hijacked and backdoored the…

Read more about the article ProxyShell Flaws “Might be Exploited” Patch Servers Now – Microsoft

ProxyShell Flaws “Might be Exploited” Patch Servers Now – Microsoft

  • Post author:Xiarch Security
  • Post published:August 26, 2021

Microsoft has recently posted the guidance today for the currently…

Read more about the article How the Malicious WhatsApp mod Harms Android Devices with Trojan

How the Malicious WhatsApp mod Harms Android Devices with Trojan

  • Post author:Xiarch Security
  • Post published:August 25, 2021

A malicious version of the FMWhatsapp mod transmits a Triadatrojan…

Read more about the article Phishing Attack Utilize UPS.com XSS Vuln to Transmit Malware!

Phishing Attack Utilize UPS.com XSS Vuln to Transmit Malware!

  • Post author:Xiarch Security
  • Post published:August 24, 2021

A clever UPS phishing campaign uses the XSS vulnerability in…

Read more about the article How this Razer Flaw permits you to become a Windows 10 Admin by Plugging in a Mouse?

How this Razer Flaw permits you to become a Windows 10 Admin by Plugging in a Mouse?

  • Post author:Xiarch Security
  • Post published:August 24, 2021

The Razer synapse zero-day vulnerability has been revealed on Twitter,…

Read more about the article LockFile Ransomware Utilizes PetiPotam Attack to Stole Windows Domains

LockFile Ransomware Utilizes PetiPotam Attack to Stole Windows Domains

  • Post author:Xiarch Security
  • Post published:August 21, 2021

At least one Ransomware threat actor has initiated to leverage…

Read more about the article New Unauthorized Windows Patch fixes More PetitPotam Attack Vectors!

New Unauthorized Windows Patch fixes More PetitPotam Attack Vectors!

  • Post author:Xiarch Security
  • Post published:August 20, 2021

Another unauthorized Patch for the Windows PetitPotam NTML relay attack…

Read more about the article CISA: BadAlloc Affects Sensitive Framework using BlackBerry QNX!

CISA: BadAlloc Affects Sensitive Framework using BlackBerry QNX!

  • Post author:Xiarch Security
  • Post published:August 18, 2021

CISA recently alerted that IoT and OT security errors known…

Read more about the article Malware Dev Impacts Own PC and Information Ends Up On Intel Platform

Malware Dev Impacts Own PC and Information Ends Up On Intel Platform

  • Post author:Xiarch Security
  • Post published:August 17, 2021

The Trojan Developer discharges their creation on their system to…

  • Go to the previous page
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025