CyberSRC
  • Home
  • About Us
  • Services
        • Cyber & Digital Security
          • Vulnerability and Penetration Testing Services
            • Web Application VA/PT
            • Mobile Application VA/PT
            • Network/ Server Security VA/PT
            • Database Security Assessment
            • Cloud Security Assessment
            • Wireless/WIFI Devices Assessment
            • API & Web Services
          • Source Code Review
          • Server Hardening Testing
          • Firewall/ Network Devices Security Review
          • Cloud Security Configuration Review
          • AI/ML Devices Security Testing
          • IOT / SCADA Devices Security Testing
          • Robotics Process Automation (RPA)
        • Managed Security Services
          • External Security Threat Intelligence
          • Honeypot as Service
          • Incident Response & Malware Analysis
          • Virtual Chief Information Security Officer (V-CISO)
          • Virtual Data Protection Officer (VDPO)
          • BCP-DR Consulting
          • Vulnerability and Penetration Testing Services
        • Specialised Cyber Security Services
          • Social Engineering Attack Simulation
            (SRC- PhaasTM )
            • Phishing
            • Smishing
            • Vishing
          • Red Teaming Exercise
          • Digital Forensics Analysis
          • Root Cause Analysis
        • Governance Risk & Compliance (GRC)
          • Compliance Management
            • ISO 27001 ISMS
            • ISO 22301 BCMS
            • ISO 27701 PIMS
            • National Institute of Standards and Technology (NIST)
            • Health Information Trust Alliance(HITRUST)
            • Control Objectives for Information and Related Technologies (COBIT)
            • Center for Internet Security (CIS)
            • PCI DSS
            • SOX (Applications & ITGC)
            • TiSAX
          • Information System Audit & Assurance
            • Cyber Essentials
            • Cyber Essentials Plus
            • IASME Consortium
            • IASME Cyber Assurance Level 2
          • IT Risk Management
            • SSAE 18 – SOC1/2/3
            • ISAE 3402
            • Third Party Security Risk Management
            • IT Risk Management
            • IT Strategy & Transformation
              • IT Strategy Review & Alignment
              • IT in Merger & Acquisition
              • Governance Framework Strategy and Implementation
          • Data Protection & Privacy
            • General Data Protection Regulation (GDPR)
            • ISO 27701 PIMS
            • California Consumer Privacy Act (CCPA)
            • Brazilian General Data Protection Law (LGPD)
            • Personal Information Protection and Electronic Documents Act (PIPEDA, Canada)
            • Singapore Personal Data Protection Act (PDPA)
            • Health Insurance Portability and Accountability Act (HIPAA)
  • Products
    • External Threat Intelligence (SRC- TI®)
    • Attack Surface Monitoring(SRC-AttackGuardTM)
  • Free Tools
    • CVE Insights
    • Free Threat Assessment Report
    • Malware Insights
  • Our Team
  • Careers
  • Training
    • ISMS
    • Phishing Awareness
    • GDPR
  • Contact Us
  • Blogs

Blogs

February 24, 2022

Iranian hackers target VMware Horizon servers with Log4j exploits


by Security Team

February 19, 2022

Fake Digital Evidences on Devices of Activists and Lawyer are planted by Hackers


by Security Team

February 17, 2022

Critical Flaws Discovered in Cisco Small Business RV Series Routers


by Security Team

February 14, 2022

Samba bug allows remote attackers to execute arbitrary code as root


by Security Team

February 11, 2022

Hackers Attempt to Exploit New SolarWinds Serv-U Bug in Log4Shell Attacks


by Security Team

February 8, 2022

Zero-Day Bugs Found in Zoom Clients and Multimedia Router Servers


by Security Team

February 7, 2022

Iranian APT Moses Has Released a New Ransomware Trojan Named StrifeWater RAT


by Security Team

February 2, 2022

Hackers Using Windows Update Service to Spread Malware


by Security Team

  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 36
© 2018-2022 CyberSRC Consultancy LLP. All rights reserved.

Click To Download

Mobile App Security Testing Services
Web Application Security Testing Services
Network Security Testing Services
AWS Cloud Security Testing Services
Vulnerability Assessment & Penetration Testing (VA/PT)
VCISO Case Study
Mobile Application (IOS) Testing Case Study
Data Localisation Solution

Download Case Studies

    Download Company Brochure