Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Black Kingdom Ransomware Penetrate Microsoft Exchange Server!

Black Kingdom Ransomware Penetrate Microsoft Exchange Server!

  • Post author:Xiarch Security
  • Post published:March 31, 2021

Microsoft released a one-click mitigation tool to revoke the Cyber…

Read more about the article How Cisco Jabber Vulnerability Permits the Hackers to Lead Remote Attack?

How Cisco Jabber Vulnerability Permits the Hackers to Lead Remote Attack?

  • Post author:Xiarch Security
  • Post published:March 25, 2021

On 24th March, Cisco released another software update that is…

Read more about the article Purple Fox Malware Exposed Windows System – Read this to know!

Purple Fox Malware Exposed Windows System – Read this to know!

  • Post author:Xiarch Security
  • Post published:March 25, 2021

Purple Fox malware was already known for transmitting over phishing…

Read more about the article Why MangaDex Manga Site Shut down After the Cyber Attack? Read this to Know!

Why MangaDex Manga Site Shut down After the Cyber Attack? Read this to Know!

  • Post author:Xiarch Security
  • Post published:March 23, 2021

Another organization is shut down after the cyberattack. The organization…

Read more about the article How Critical F5 BIG-IP Bug Attack After the PoC Exploited Online?

How Critical F5 BIG-IP Bug Attack After the PoC Exploited Online?

  • Post author:Xiarch Security
  • Post published:March 22, 2021

The security organization named F5 released a security patch after…

Read more about the article How Phishing Emails are Spreading the Sophisticated Malware?

How Phishing Emails are Spreading the Sophisticated Malware?

  • Post author:Xiarch Security
  • Post published:March 22, 2021

A new phishing email campaign was spotted by the FBI…

Read more about the article New Attack that Authorizes the Attackers to Track the Users with the help of JavaScript!

New Attack that Authorizes the Attackers to Track the Users with the help of JavaScript!

  • Post author:Xiarch Security
  • Post published:March 19, 2021

The security researcher and multiple law enforcement agencies have discovered…

Read more about the article Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!

Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!

  • Post author:Xiarch Security
  • Post published:March 19, 2021

Another vulnerability was discovered in Zoom’s screen sharing feature that…

Read more about the article How Twitter Images can be Misused While Hiding MP3, ZIP Files?

How Twitter Images can be Misused While Hiding MP3, ZIP Files?

  • Post author:Xiarch Security
  • Post published:March 18, 2021

On 17th March 2021, the security researcher identified a method…

Read more about the article New POC Microsoft Exchange Bug That Enhances New Attacks!

New POC Microsoft Exchange Bug That Enhances New Attacks!

  • Post author:Xiarch Security
  • Post published:March 16, 2021

Another proof of concept has been released that discovered the…

Read more about the article Scammers Distributes Fake Cryptocurrency Giveaways through Twitter Ads!

Scammers Distributes Fake Cryptocurrency Giveaways through Twitter Ads!

  • Post author:Xiarch Security
  • Post published:March 15, 2021

Attackers are now using the Promoted tweets on Twitter to…

Read more about the article Researchers Reveals the New Linux Malware is Connected to Chinese Hackers!

Researchers Reveals the New Linux Malware is Connected to Chinese Hackers!

  • Post author:Xiarch Security
  • Post published:March 15, 2021

On 10th March 2021, the cybersecurity researcher said that they…

  • Go to the previous page
  • 1
  • …
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025