Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Emails Fatigue Among Users Open the doors for Threat Actors!

Emails Fatigue Among Users Open the doors for Threat Actors!

  • Post author:Xiarch Security
  • Post published:July 8, 2021

Given the group transmission to remote work, more sensitive business…

Read more about the article Why and How PrintNightmare Public 0 Day Exploit Permits Takeover?

Why and How PrintNightmare Public 0 Day Exploit Permits Takeover?

  • Post author:Xiarch Security
  • Post published:July 6, 2021

All the Windows users, here’s the news for you: a…

Read more about the article Thousands of Fake Online Pharmacies Shut Down by Interpol

Thousands of Fake Online Pharmacies Shut Down by Interpol

  • Post author:Xiarch Security
  • Post published:June 14, 2021

Interpol short for International Criminal Police Organization has shut down…

Read more about the article How Seven-Year-Old Polkit Patch Permits Unauthorized Users Gain Root Access?

How Seven-Year-Old Polkit Patch Permits Unauthorized Users Gain Root Access?

  • Post author:Xiarch Security
  • Post published:June 14, 2021

A 7-years-old authority intensify vulnerability found in the polkit system…

Read more about the article Samsung Pre-Installed Apps can be utilized by Hackers to Spy on Users

Samsung Pre-Installed Apps can be utilized by Hackers to Spy on Users

  • Post author:Xiarch Security
  • Post published:June 11, 2021

Various sensitive security errors have been discovered in Samsung’s pre-installed…

Read more about the article Advance UAF Vulnerability Affecting Microsoft Office to Patched Today

Advance UAF Vulnerability Affecting Microsoft Office to Patched Today

  • Post author:Xiarch Security
  • Post published:June 9, 2021

Four security vulnerabilities found in the Microsoft Office suite, which…

Read more about the article Cross-site Tracking Blocked in Private Browsing – Firefox

Cross-site Tracking Blocked in Private Browsing – Firefox

  • Post author:Xiarch Security
  • Post published:June 2, 2021

Firefox states that Mozilla users will be secured against cross-site…

Read more about the article Current Target of the Iranian hacking group is Israel with Wipe Camouflage as ransomware

Current Target of the Iranian hacking group is Israel with Wipe Camouflage as ransomware

  • Post author:Xiarch Security
  • Post published:May 26, 2021

The Iranian hacking group has been recognizing disguising disastrous attacks…

Read more about the article WinRM server are also affected by the Wormable Windows HTTP susceptibility

WinRM server are also affected by the Wormable Windows HTTP susceptibility

  • Post author:Xiarch Security
  • Post published:May 25, 2021

By the Wormable vulnerability in the HTTP Protocol Stack of…

Read more about the article Network Can be Abused to Steel Crucial Information From the nearby devices – Apple

Network Can be Abused to Steel Crucial Information From the nearby devices – Apple

  • Post author:Xiarch Security
  • Post published:May 19, 2021

From the current searches, it has been found a new…

Read more about the article Approximately All Wireless Devices Are Vulnerable to New FragAttacks!

Approximately All Wireless Devices Are Vulnerable to New FragAttacks!

  • Post author:Xiarch Security
  • Post published:May 18, 2021

Numerous implementation flaws and three architectures have been revel in…

Read more about the article Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild!

Hackers Exploit Adobe Reader Zero-Day Vulnerability in the Wild!

  • Post author:Xiarch Security
  • Post published:May 12, 2021

Adobe is now going to release the patch on Tuesday…

  • Go to the previous page
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025