Skip to content
Xiarch Solutions Private Limited
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Menu Close
  • Home
  • Infosec News
  • Vulnerabilities
  • Breaches
  • Consulting
  • Learn
  • Infosec Services
    • Web Application Security
    • ISO 27001 Compliance Audit
    • Red Team Attack Simulation
    • Mobile Application Security
    • GDPR Compliance Audit
    • Phishing Simulation
    • Network & Infrastructure Security
    • SOC2 Compliance Audit
    • Social Engineering Service
    • API & Web Service Security
    • PCI DSS Compliance Audit
    • Incident Response & Malware Analysis
    • IoT Device Security
    • SEBI Compliance Audit
    • Load & Performance Testing
    • Source Code Review
    • RBI Compliance Audit
    • Forensic Analysis
    • Cloud Security Assessment
    • IRDA ISNP Audit
    • DDos Assessment Services
  • Toggle website search
Read more about the article Ukraine Takes Down Call Centers behind Cryptocurrency Investor Scams

Ukraine Takes Down Call Centers behind Cryptocurrency Investor Scams

  • Post author:Xiarch Security
  • Post published:September 28, 2021

The Security Service of Ukraine (SBU) has taken down a…

Read more about the article Microsoft: Nobelium Utilizes Custom Malware to Backdoor Windows Domains

Microsoft: Nobelium Utilizes Custom Malware to Backdoor Windows Domains

  • Post author:Xiarch Security
  • Post published:September 28, 2021

Microsoft has revealed new malware utilized by the Nobelium hacking…

Read more about the article Microsoft WPBT Bug Allow Threat Actors to Install Rootkits on Windows Devices

Microsoft WPBT Bug Allow Threat Actors to Install Rootkits on Windows Devices

  • Post author:Xiarch Security
  • Post published:September 27, 2021

Security Investigators have discovered a bug in the Microsoft Windows…

Read more about the article VMware Alerts of Sensitive Flaw in Default vCenter Server Installs

VMware Alerts of Sensitive Flaw in Default vCenter Server Installs

  • Post author:Xiarch Security
  • Post published:September 22, 2021

VMware informs its customers to urgently patch a sensitive arbitrary…

Read more about the article AT&T lost $200M in Past Seven Years to illegal Phone Unlocking Scheme

AT&T lost $200M in Past Seven Years to illegal Phone Unlocking Scheme

  • Post author:Xiarch Security
  • Post published:September 20, 2021

A Pakistani threat actor was sentenced to 12 years in…

Read more about the article Microsoft Azure VMs Abused to Drop Mirai, Miners – OMIGOD

Microsoft Azure VMs Abused to Drop Mirai, Miners – OMIGOD

  • Post author:Xiarch Security
  • Post published:September 18, 2021

Attackers initiated currently exploiting the sensitive Azure OMIGOD vulnerabilities two…

Read more about the article How does this Advance Windows Security Updates Break Network Printing?

How does this Advance Windows Security Updates Break Network Printing?

  • Post author:Xiarch Security
  • Post published:September 18, 2021

Windows administrators report wide-scale network printing problems after installing this…

Read more about the article New Malware Utilizes Windows Subsystem for Linux for Crafty Attacks

New Malware Utilizes Windows Subsystem for Linux for Crafty Attacks

  • Post author:Xiarch Security
  • Post published:September 17, 2021

Security investigators have found the malicious Linux binaries generated for…

Read more about the article FBI and CISA alert of state Hackers Exploiting Critical Zoho Flaw

FBI and CISA alert of state Hackers Exploiting Critical Zoho Flaw

  • Post author:Xiarch Security
  • Post published:September 17, 2021

The FBI, CISA, and the Coast Guard Command (CGCYBER) recently…

Read more about the article MikroTik Shares Information on Protecting Routers Hit by Massive Meris Botnet

MikroTik Shares Information on Protecting Routers Hit by Massive Meris Botnet

  • Post author:Xiarch Security
  • Post published:September 16, 2021

The Latvian network tool manufacturer MikroTik has transmitted the information…

Read more about the article Microsoft Fixes a Critical Bugs ‘OMIGOD’ in Azure Linux App

Microsoft Fixes a Critical Bugs ‘OMIGOD’ in Azure Linux App

  • Post author:Xiarch Security
  • Post published:September 16, 2021

Microsoft has tracked four critical vulnerabilities collectively called OMIGOD which…

Read more about the article Over Millions of HP OMEN Gaming PCs Affected by Driver Vulnerability

Over Millions of HP OMEN Gaming PCs Affected by Driver Vulnerability

  • Post author:Xiarch Security
  • Post published:September 15, 2021

Over millions of HP OMEN laptops and desktop gaming computers…

  • Go to the previous page
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 20
  • Go to the next page

Xiarch is a Certified CERT-In Empanelled Company and also ISO 9001-2015, 27001-2013 certified Global Consultation and Implementation firm.

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab

Security Assessment Services

  • Web Application Security
  • Mobile Application Security
  • Network & Infrastructure Security
  • API & Web Service Security
  • IoT Device Security
  • Source Code Review
  • Cloud Security Assessment

Compliance Services

  • ISO 27001 Compliance Audit
  • GDPR Compliance Audit
  • SOC2 Compliance Audit
  • PCI DSS Compliance Audit
  • SEBI Compliance Audit
  • RBI Compliance Audit
  • IRDA ISNP Audit

Specialized Security Services

  • Red Team Attack Simulation
  • Phishing Simulation
  • Social Engineering Service
  • Incident Response & Malware Analysis
  • Load & Performance Testing
  • Forensic Analysis
  • DDos Assessment Services
  • Terms and Conditions
  • Privacy Policy
Copyright © Xiarch 2025