Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Apple Delivers Security Patch for Remote Hacking Bug that Infects Billions of Devices!
Encryption your data. Digital Lock. Hacker attack and data breach. Big data with encrypted computer code. Safe your data. Cyber internet security and privacy concept. Database storage 3d illustration

Apple Delivers Security Patch for Remote Hacking Bug that Infects Billions of Devices!

  • Post author:Xiarch Security
  • Post published:March 9, 2021

Apple finally released an update for the security patch for…

Read more about the article How Gootkit Rat Use SEO to Distribute Malware Using Compromised Sites?

How Gootkit Rat Use SEO to Distribute Malware Using Compromised Sites?

  • Post author:Xiarch Security
  • Post published:March 6, 2021

An updated framework is used by the attackers while delivering…

Read more about the article World Leading Dairy Group Hit by CyberAttack – Lactalis International

World Leading Dairy Group Hit by CyberAttack – Lactalis International

  • Post author:Xiarch Security
  • Post published:March 3, 2021

Another cyber attack was reported, this time attackers targeted the…

Read more about the article Microsoft Resolved Windows 10 Drive Corruption Bug – Read this to know!

Microsoft Resolved Windows 10 Drive Corruption Bug – Read this to know!

  • Post author:Xiarch Security
  • Post published:March 1, 2021

Microsoft fixed the Windows 10 bug that corrupts the hard…

Read more about the article How Hackers Employ Phishing Attacks using Zoom?

How Hackers Employ Phishing Attacks using Zoom?

  • Post author:Xiarch Security
  • Post published:March 1, 2021

In the period of the pandemic, businesses are facing multiple…

Read more about the article APT 32 Attackers Start Targeting Human Rights Defenders using Spyware!

APT 32 Attackers Start Targeting Human Rights Defenders using Spyware!

  • Post author:Xiarch Security
  • Post published:February 25, 2021

The hacker group named APT 32 start targeting Vietnamese HRDs…

Read more about the article New Malware Infect 30,000 Macs for Unknown Purpose!

New Malware Infect 30,000 Macs for Unknown Purpose!

  • Post author:Xiarch Security
  • Post published:February 23, 2021

Silver Sparrow new malware discovered that infects around 30,000 Mac…

Read more about the article Alert: Google Warned About Fake Adobe Flash Player Update!
Alert: Google Warned About Fake Adobe Flash Player Update!

Alert: Google Warned About Fake Adobe Flash Player Update!

  • Post author:Xiarch Security
  • Post published:February 23, 2021

Hackers are misusing Google alerts while promoting a Fraud Adobe…

Read more about the article MassLogger Trojan is Reprogrammed to Steal Outlook Chrome Credentials!

MassLogger Trojan is Reprogrammed to Steal Outlook Chrome Credentials!

  • Post author:Xiarch Security
  • Post published:February 19, 2021

On 17th Feb, a security researcher discovered that this attack…

Read more about the article Unofficial Micropatch is delivered to Internet Explorer 11 that Fixes Zero-day Vulnerability!

Unofficial Micropatch is delivered to Internet Explorer 11 that Fixes Zero-day Vulnerability!

  • Post author:Xiarch Security
  • Post published:February 12, 2021

In January, Microsoft and Google founded that the North Koran…

Read more about the article RansomExx Ransomware hit MNH Health Insurance Company!

RansomExx Ransomware hit MNH Health Insurance Company!

  • Post author:Xiarch Security
  • Post published:February 11, 2021

Today, a French health insurance company named Mutuelle Nationale des…

Read more about the article Microsoft Delivered Patch for 0-Day Exploit and 55 Additional Windows Bugs!

Microsoft Delivered Patch for 0-Day Exploit and 55 Additional Windows Bugs!

  • Post author:Xiarch Security
  • Post published:February 10, 2021

On 9th Feb 2020, Microsoft released an updated patch the…

  • Go to the previous page
  • 1
  • …
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025