Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Fraud Subscription Campaign targeted Million of Android Users

Fraud Subscription Campaign targeted Million of Android Users

  • Post author:Xiarch Security
  • Post published:October 26, 2021

An enormous fraud operation using 151 Android applications with 10.5…

Read more about the article Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan

Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan

  • Post author:Xiarch Security
  • Post published:October 22, 2021

Widespread malware operations are designing YouTube videos to administrate password-hijacking…

Read more about the article YouTuber’s Accounts Seized with Cookie-Hijacking Malware – Google

YouTuber’s Accounts Seized with Cookie-Hijacking Malware – Google

  • Post author:Xiarch Security
  • Post published:October 21, 2021

Google says YouTube creators have been targeted with credentials hijacking…

Read more about the article New Karma Ransomware Gang likely a Nemty Rebrand

New Karma Ransomware Gang likely a Nemty Rebrand

  • Post author:Xiarch Security
  • Post published:October 19, 2021

Security investigators discover the clues of the Karma ransomware existence…

Read more about the article New Windows 10 KB5006670 update breaks Network Printing

New Windows 10 KB5006670 update breaks Network Printing

  • Post author:Xiarch Security
  • Post published:October 16, 2021

Windows 10 users and administrators report widescale network printing issues…

Read more about the article How does PyPI eliminate ‘mitmproxy2’ over Code Execution Concerns?

How does PyPI eliminate ‘mitmproxy2’ over Code Execution Concerns?

  • Post author:Xiarch Security
  • Post published:October 13, 2021

The PyPI repository has removed a Python package called ‘mitmproxy2’…

Read more about the article Dutch Police send Warning letters to DDoS Booter Users

Dutch Police send Warning letters to DDoS Booter Users

  • Post author:Xiarch Security
  • Post published:October 13, 2021

Dutch authorities gave a final warning to more than a…

Read more about the article Intuit Alerts QuickBooks Customers of Current Phishing Attacks

Intuit Alerts QuickBooks Customers of Current Phishing Attacks

  • Post author:Xiarch Security
  • Post published:October 9, 2021

Intuit has alerted QuickBooks users that they are targeted by…

Read more about the article Threat Actors Utilizes secretive ShellClient Malware on aerospace, Telco Firms

Threat Actors Utilizes secretive ShellClient Malware on aerospace, Telco Firms

  • Post author:Xiarch Security
  • Post published:October 7, 2021

Security researchers searching malware utilized to target companies in the…

Read more about the article How Windows to KB5005611 Update Fixes Microsoft Outlook Issues?

How Windows to KB5005611 Update Fixes Microsoft Outlook Issues?

  • Post author:Xiarch Security
  • Post published:October 1, 2021

Recently, Microsoft has released the optional KB5005611 Preview cumulative update…

Read more about the article Google Launches Emergency Chrome Update to fix two Zero-days

Google Launches Emergency Chrome Update to fix two Zero-days

  • Post author:Xiarch Security
  • Post published:October 1, 2021

Google has recently released Chrome 94.0.4606.71 for Windows, Mac, and…

Read more about the article Advance Microsoft Exchange Service Alleviates High-Risk Flaws Automatically

Advance Microsoft Exchange Service Alleviates High-Risk Flaws Automatically

  • Post author:Xiarch Security
  • Post published:September 29, 2021

Recently, Microsoft has added an advanced Exchange Server feature that…

  • Go to the previous page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025