Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article How Linux Variant of Avos Locker Ransomware Targets VMware ESXi servers?

How Linux Variant of Avos Locker Ransomware Targets VMware ESXi servers?

  • Post author:Xiarch Security
  • Post published:January 11, 2022

AvosLocker is the latest ransomware gang that has added support…

Read more about the article Rapid Window Title Reverts Causes ‘White Screen of Death’

Rapid Window Title Reverts Causes ‘White Screen of Death’

  • Post author:Xiarch Security
  • Post published:January 10, 2022

Experimentation with ANSI desertion characters on terminal emulators has led…

Read more about the article A dnspy Malware Drops a Cocktail on Developers and Researchers

A dnspy Malware Drops a Cocktail on Developers and Researchers

  • Post author:Xiarch Security
  • Post published:January 10, 2022

Attackers targeted the Cybersecurity Developers and Investigators this week in…

Read more about the article Why do attackers utilize BadUSB to target Defense organizations with Ransomware?

Why do attackers utilize BadUSB to target Defense organizations with Ransomware?

  • Post author:Xiarch Security
  • Post published:January 8, 2022

The FBI (Federal Bureau of Investigation) alerted US firms in…

Read more about the article FluBot Malware Now Targets Europe Assuming as the Flash Player Application

FluBot Malware Now Targets Europe Assuming as the Flash Player Application

  • Post author:Xiarch Security
  • Post published:January 8, 2022

The extensively appropriated FluBot malware extends to emerge, with new…

Read more about the article Why Swiss Army Bans All Messaging Applications but Locally-Created Threema?

Why Swiss Army Bans All Messaging Applications but Locally-Created Threema?

  • Post author:Xiarch Security
  • Post published:January 7, 2022

The Swiss army has banned foreign instant-messaging applications such as…

Read more about the article FinalSite Ransomware Attack Close Thousands of School Websites

FinalSite Ransomware Attack Close Thousands of School Websites

  • Post author:Xiarch Security
  • Post published:January 7, 2022

A leading School Website Service Provider, FinalSite has suffered a…

Read more about the article 70 Investors lose $50 Million to Swindler Posing as Broker-Dealers

70 Investors lose $50 Million to Swindler Posing as Broker-Dealers

  • Post author:Xiarch Security
  • Post published:January 6, 2022

A man in California man accepted his role in a…

Read more about the article ‘Elephant Beetle’ Allocate Months in Victim Networks to Divert Transactions

‘Elephant Beetle’ Allocate Months in Victim Networks to Divert Transactions

  • Post author:Xiarch Security
  • Post published:January 6, 2022

A financially-inspired attacker known as ‘Elephant Beetle’ is seizing millions…

Read more about the article How Purple Fox Malware Distributed through Malicious Telegram Installers?

How Purple Fox Malware Distributed through Malicious Telegram Installers?

  • Post author:Xiarch Security
  • Post published:January 4, 2022

A malicious Telegram for Desktop installer distributes the purple Fox…

Read more about the article Uber Avoid the Vulnerability that Permits you to Send Any Email from Uber.com
A woman checks the Uber transport application on her mobile phone after authorities ordered its suspension in Colombia, in Bogota on December 20, 2019. (Photo by Juan BARRETO / AFP) (Photo by JUAN BARRETO/AFP via Getty Images)

Uber Avoid the Vulnerability that Permits you to Send Any Email from Uber.com

  • Post author:Xiarch Security
  • Post published:January 3, 2022

A vulnerability in Uber’s email system permits just about anyone…

Read more about the article Silent Danger: One in five elderly Domains is Malicious Risky, or Unsafe

Silent Danger: One in five elderly Domains is Malicious Risky, or Unsafe

  • Post author:Xiarch Security
  • Post published:January 3, 2022

The number of malicious dormant domains is on the rise,…

  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025