CyberSRC
  • Home
  • About Us
  • Services
        • Cyber & Digital Security
          • Vulnerability and Penetration Testing Services
            • Web Application VA/PT
            • Mobile Application VA/PT
            • Network/ Server Security VA/PT
            • Database Security Assessment
            • Cloud Security Assessment
            • Wireless/WIFI Devices Assessment
            • API & Web Services
          • Source Code Review
          • Server Hardening Testing
          • Firewall/ Network Devices Security Review
          • Cloud Security Configuration Review
          • AI/ML Devices Security Testing
          • IOT / SCADA Devices Security Testing
          • Robotics Process Automation (RPA)
        • Managed Security Services
          • External Security Threat Intelligence
          • Honeypot as Service
          • Incident Response & Malware Analysis
          • Virtual Chief Information Security Officer (V-CISO)
          • Virtual Data Protection Officer (VDPO)
          • BCP-DR Consulting
          • Vulnerability and Penetration Testing Services
        • Specialised Cyber Security Services
          • Social Engineering Attack Simulation
            (SRC- PhaasTM )
            • Phishing
            • Smishing
            • Vishing
          • Red Teaming Exercise
          • Digital Forensics Analysis
          • Root Cause Analysis
        • Governance Risk & Compliance (GRC)
          • Compliance Management
            • ISO 27001 ISMS
            • ISO 22301 BCMS
            • ISO 27701 PIMS
            • National Institute of Standards and Technology (NIST)
            • Health Information Trust Alliance(HITRUST)
            • Control Objectives for Information and Related Technologies (COBIT)
            • Center for Internet Security (CIS)
            • PCI DSS
            • SOX (Applications & ITGC)
            • TiSAX
          • Information System Audit & Assurance
            • Cyber Essentials
            • Cyber Essentials Plus
            • IASME Consortium
            • IASME Cyber Assurance Level 2
          • IT Risk Management
            • SSAE 18 – SOC1/2/3
            • ISAE 3402
            • Third Party Security Risk Management
            • IT Risk Management
            • IT Strategy & Transformation
              • IT Strategy Review & Alignment
              • IT in Merger & Acquisition
              • Governance Framework Strategy and Implementation
          • Data Protection & Privacy
            • General Data Protection Regulation (GDPR)
            • ISO 27701 PIMS
            • California Consumer Privacy Act (CCPA)
            • Brazilian General Data Protection Law (LGPD)
            • Personal Information Protection and Electronic Documents Act (PIPEDA, Canada)
            • Singapore Personal Data Protection Act (PDPA)
            • Health Insurance Portability and Accountability Act (HIPAA)
  • Products
    • External Threat Intelligence (SRC- TI®)
    • Attack Surface Monitoring(SRC-AttackGuardTM)
  • Free Tools
    • CVE Insights
    • Free Threat Assessment Report
    • Malware Insights
  • Our Team
  • Careers
  • Training
    • ISMS
    • Phishing Awareness
    • GDPR
  • Contact Us
  • Blogs

Security

November 10, 2020

FBI: Hackers Stole Source Code from Government Agencies and Private Firms


by Security Team

November 6, 2020

Hackers Access TCP/UDP Service Using NAT/Firewall Bypass Attack


by Security Team

November 2, 2020

Trojan TrickBot Anchor Malware Found In Linux


by Security Team

October 31, 2020

Oracle WebLogic Server Affected by RCE Flaw


by Security Team

October 27, 2020

Russian Hackers Penetrate U.S. Federal Agency


by Security Team

October 21, 2020

Millions of patient’s data exposed by Dr Lal PathLabs


by Security Team

October 13, 2020

Adobe fixes critical vulnerabilities in InDesign and Framemaker


by Security Team

October 1, 2020

Vulnerabilities Identified in Patient Monitoring Software


by Security Team

  • 1
  • …
  • 22
  • 23
  • 24
  • 25
  • 26
  • …
  • 36
© 2018-2022 CyberSRC Consultancy LLP. All rights reserved.

Click To Download

Mobile App Security Testing Services
Web Application Security Testing Services
Network Security Testing Services
AWS Cloud Security Testing Services
Vulnerability Assessment & Penetration Testing (VA/PT)
VCISO Case Study
Mobile Application (IOS) Testing Case Study
Data Localisation Solution

Download Case Studies

    Download Company Brochure