CyberSRC
  • Home
  • About Us
  • Services
        • Cyber & Digital Security
          • Vulnerability and Penetration Testing Services
            • Web Application VA/PT
            • Mobile Application VA/PT
            • Network/ Server Security VA/PT
            • Database Security Assessment
            • Cloud Security Assessment
            • Wireless/WIFI Devices Assessment
            • API & Web Services
          • Source Code Review
          • Server Hardening Testing
          • Firewall/ Network Devices Security Review
          • Cloud Security Configuration Review
          • AI/ML Devices Security Testing
          • IOT / SCADA Devices Security Testing
          • Robotics Process Automation (RPA)
        • Managed Security Services
          • External Security Threat Intelligence
          • Honeypot as Service
          • Incident Response & Malware Analysis
          • Virtual Chief Information Security Officer (V-CISO)
          • Virtual Data Protection Officer (VDPO)
          • BCP-DR Consulting
          • Vulnerability and Penetration Testing Services
        • Specialised Cyber Security Services
          • Social Engineering Attack Simulation
            (SRC- PhaasTM )
            • Phishing
            • Smishing
            • Vishing
          • Red Teaming Exercise
          • Digital Forensics Analysis
          • Root Cause Analysis
        • Governance Risk & Compliance (GRC)
          • Compliance Management
            • ISO 27001 ISMS
            • ISO 22301 BCMS
            • ISO 27701 PIMS
            • National Institute of Standards and Technology (NIST)
            • Health Information Trust Alliance(HITRUST)
            • Control Objectives for Information and Related Technologies (COBIT)
            • Center for Internet Security (CIS)
            • PCI DSS
            • SOX (Applications & ITGC)
            • TiSAX
          • Information System Audit & Assurance
            • Cyber Essentials
            • Cyber Essentials Plus
            • IASME Consortium
            • IASME Cyber Assurance Level 2
          • IT Risk Management
            • SSAE 18 – SOC1/2/3
            • ISAE 3402
            • Third Party Security Risk Management
            • IT Risk Management
            • IT Strategy & Transformation
              • IT Strategy Review & Alignment
              • IT in Merger & Acquisition
              • Governance Framework Strategy and Implementation
          • Data Protection & Privacy
            • General Data Protection Regulation (GDPR)
            • ISO 27701 PIMS
            • California Consumer Privacy Act (CCPA)
            • Brazilian General Data Protection Law (LGPD)
            • Personal Information Protection and Electronic Documents Act (PIPEDA, Canada)
            • Singapore Personal Data Protection Act (PDPA)
            • Health Insurance Portability and Accountability Act (HIPAA)
  • Products
    • External Threat Intelligence (SRC- TI®)
    • Attack Surface Monitoring(SRC-AttackGuardTM)
  • Free Tools
    • CVE Insights
    • Free Threat Assessment Report
    • Malware Insights
  • Our Team
  • Careers
  • Training
    • ISMS
    • Phishing Awareness
    • GDPR
  • Contact Us
  • Blogs

Blogs

January 31, 2022

Earth Lusca a Financially Motivated Attack on Government and Private Organization


by Security Team

January 28, 2022

“WhisperGate Malware” targeting Microsoft Windows In Ukraine


by Security Team

January 24, 2022

New Unpatched Apple Safari Browser Bug Allows Cross-Site User Tracking


by Security Team

January 19, 2022

NoReboot attack fakes iOS phones shutdown to spy on users


by Security Team

January 15, 2022

Microsoft Issues Fix for Exchange Y2K22 Bug That Crippled Email Delivery Service


by Security Team

January 12, 2022

Stop downloading Pirated ‘Spider-Man: No Way Home’: Contains Crypto-Mining Malware


by Security Team

January 10, 2022

Zloader malware exploits Microsoft’s digital signature verification


by Security Team

January 6, 2022

‘Fake Telegram Messenger App are Hacking PCs with Purple Fox Malware’


by Security Team

  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 36
© 2018-2022 CyberSRC Consultancy LLP. All rights reserved.

Click To Download

Mobile App Security Testing Services
Web Application Security Testing Services
Network Security Testing Services
AWS Cloud Security Testing Services
Vulnerability Assessment & Penetration Testing (VA/PT)
VCISO Case Study
Mobile Application (IOS) Testing Case Study
Data Localisation Solution

Download Case Studies

    Download Company Brochure