Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Advance Windows 11 build fixes Microsoft Installer Issue Breaking Applications

Advance Windows 11 build fixes Microsoft Installer Issue Breaking Applications

  • Post author:Xiarch Security
  • Post published:November 22, 2021

Microsoft has resolved a recently confirmed Windows 11 issue in…

Read more about the article Glitch Service Abused to Host Short-Lived Phishing Sites

Glitch Service Abused to Host Short-Lived Phishing Sites

  • Post author:Xiarch Security
  • Post published:November 20, 2021

Phishing actors are now actively exploiting the Glitch platform to…

Read more about the article Around Six Million Routers Revealed to Take over the Attacks on 17 Months

Around Six Million Routers Revealed to Take over the Attacks on 17 Months

  • Post author:Xiarch Security
  • Post published:November 20, 2021

Around six million Sky Broadband customer routers in the UK…

Read more about the article Advance Memento Ransomware Switches to WinRar after Declining at Encryption

Advance Memento Ransomware Switches to WinRar after Declining at Encryption

  • Post author:Xiarch Security
  • Post published:November 19, 2021

A new ransomware group called Memento takes the unusual approach…

Read more about the article Android Malware BrazKing Returns as Crafty Banking Trojan

Android Malware BrazKing Returns as Crafty Banking Trojan

  • Post author:Xiarch Security
  • Post published:November 19, 2021

The BrazKing Android banking Trojan has returned with dynamic banking…

Read more about the article Attackers Offer Million of Zero-Days, Developers Talk to Exploit-as-a-service

Attackers Offer Million of Zero-Days, Developers Talk to Exploit-as-a-service

  • Post author:Xiarch Security
  • Post published:November 17, 2021

While frequently hidden in private communications, details sometimes appear about…

Read more about the article What are the new Emotet Spam Operations Hitting Mailboxes across the World?

What are the new Emotet Spam Operations Hitting Mailboxes across the World?

  • Post author:Xiarch Security
  • Post published:November 17, 2021

The Emotet malware kicked into action in recent days after…

Read more about the article NPM fixes private package names leak, Serious Authorization Flaw

NPM fixes private package names leak, Serious Authorization Flaw

  • Post author:Xiarch Security
  • Post published:November 17, 2021

The largest software registry of Node.js packages, npm, has disclosed…

Read more about the article Advance Rowhammer Tactics Avoid Existing of DDR4 Memory Defenses

Advance Rowhammer Tactics Avoid Existing of DDR4 Memory Defenses

  • Post author:Xiarch Security
  • Post published:November 17, 2021

Investigators have set up an advance fuzzing-based tactics called “Blacksmith”…

Read more about the article QBot returns for an Advance wave of Adversaries by utilizing Squirrelwaffle

QBot returns for an Advance wave of Adversaries by utilizing Squirrelwaffle

  • Post author:Xiarch Security
  • Post published:November 15, 2021

The activity of the QBot (also known as Quakbot) banking…

Read more about the article AMD fixes Multiple Windows 10 Graphic Driver Security Flaws

AMD fixes Multiple Windows 10 Graphic Driver Security Flaws

  • Post author:Xiarch Security
  • Post published:November 12, 2021

AMD has resolved a long list of security vulnerabilities found…

Read more about the article Gmail Account is Utilized in 91% of all Baiting Email Attacks

Gmail Account is Utilized in 91% of all Baiting Email Attacks

  • Post author:Xiarch Security
  • Post published:November 12, 2021

Bail attacks are on the rise, and it comes that…

  • Go to the previous page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025