CyberSRC
  • Home
  • About Us
  • Services
        • Cyber & Digital Security
          • Vulnerability and Penetration Testing Services
            • Web Application VA/PT
            • Mobile Application VA/PT
            • Network/ Server Security VA/PT
            • Database Security Assessment
            • Cloud Security Assessment
            • Wireless/WIFI Devices Assessment
            • API & Web Services
          • Source Code Review
          • Server Hardening Testing
          • Firewall/ Network Devices Security Review
          • Cloud Security Configuration Review
          • AI/ML Devices Security Testing
          • IOT / SCADA Devices Security Testing
          • Robotics Process Automation (RPA)
        • Managed Security Services
          • External Security Threat Intelligence
          • Honeypot as Service
          • Incident Response & Malware Analysis
          • Virtual Chief Information Security Officer (V-CISO)
          • Virtual Data Protection Officer (VDPO)
          • BCP-DR Consulting
          • Vulnerability and Penetration Testing Services
        • Specialised Cyber Security Services
          • Social Engineering Attack Simulation
            (SRC- PhaasTM )
            • Phishing
            • Smishing
            • Vishing
          • Red Teaming Exercise
          • Digital Forensics Analysis
          • Root Cause Analysis
        • Governance Risk & Compliance (GRC)
          • Compliance Management
            • ISO 27001 ISMS
            • ISO 22301 BCMS
            • ISO 27701 PIMS
            • National Institute of Standards and Technology (NIST)
            • Health Information Trust Alliance(HITRUST)
            • Control Objectives for Information and Related Technologies (COBIT)
            • Center for Internet Security (CIS)
            • PCI DSS
            • SOX (Applications & ITGC)
            • TiSAX
          • Information System Audit & Assurance
            • Cyber Essentials
            • Cyber Essentials Plus
            • IASME Consortium
            • IASME Cyber Assurance Level 2
          • IT Risk Management
            • SSAE 18 – SOC1/2/3
            • ISAE 3402
            • Third Party Security Risk Management
            • IT Risk Management
            • IT Strategy & Transformation
              • IT Strategy Review & Alignment
              • IT in Merger & Acquisition
              • Governance Framework Strategy and Implementation
          • Data Protection & Privacy
            • General Data Protection Regulation (GDPR)
            • ISO 27701 PIMS
            • California Consumer Privacy Act (CCPA)
            • Brazilian General Data Protection Law (LGPD)
            • Personal Information Protection and Electronic Documents Act (PIPEDA, Canada)
            • Singapore Personal Data Protection Act (PDPA)
            • Health Insurance Portability and Accountability Act (HIPAA)
  • Products
    • External Threat Intelligence (SRC- TI®)
    • Attack Surface Monitoring(SRC-AttackGuardTM)
  • Free Tools
    • CVE Insights
    • Free Threat Assessment Report
    • Malware Insights
  • Our Team
  • Careers
  • Training
    • ISMS
    • Phishing Awareness
    • GDPR
  • Contact Us
  • Blogs

Security Team

May 18, 2022

AT&T launches SASE with Cisco Meraki to enable security anywhere


0 Comments4 Minutes

May 13, 2022

BIG-IP iControl REST Vulnerability Alerted by F5


0 Comments3 Minutes

May 9, 2022

New Fileless Malware uses Windows Event Logs for Hiding Shellcode


0 Comments6 Minutes

May 6, 2022

Blackcat/ALPHV ransomware breaches 60+ organizations


0 Comments2 Minutes

May 4, 2022

New RIG Exploit kit drops RedLine malware


0 Comments4 Minutes

April 16, 2022

Fake apps are spreading a new Android Trojan called Octo Banking


0 Comments4 Minutes

April 8, 2022

SOPHOS FIREWALL RCE VULNERABILITY UNDER ACTIVE EXPLOITATION


0 Comments3 Minutes

April 6, 2022

New python-based Ransomware Targeting JupyterLab Web Notebooks


0 Comments5 Minutes

  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 35
© 2018-2022 CyberSRC Consultancy LLP. All rights reserved.

Click To Download

Mobile App Security Testing Services
Web Application Security Testing Services
Network Security Testing Services
AWS Cloud Security Testing Services
Vulnerability Assessment & Penetration Testing (VA/PT)
VCISO Case Study
Mobile Application (IOS) Testing Case Study
Data Localisation Solution

Download Case Studies

    Download Company Brochure