CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Daily Archives: 25/09/2024

Home2024September25
25 Sep
Blogs

Chinese hackers build massive IoT botnet, feds warn

Posted by author-avatar admin
25/09/2024
0
A trio of U.S. government agencies are banding together in an effort to dismantle a Chinese government-backed botnet.The FBI, National ...
Continue reading
25 Sep
Blogs

Ivanti vTM flaw added to Known Exploited Vulnerabilities catalog

Posted by author-avatar admin
25/09/2024
0
A critical vulnerability in Ivanti Virtual Traffic Manager (vTM) was added to the Known Exploited Vulnerabilities (KEV) catalog by the ...
Continue reading
25 Sep
Blogs

AutoCanada employee data possibly compromised in Hunters International attack

Posted by author-avatar admin
25/09/2024
0
Major North American auto dealership firm AutoCanada disclosed the potential exposure of its employees' data following a cyberattack la...
Continue reading
25 Sep
Blogs

G7 Cyber Expert Group warns financial sector of quantum computing

Posted by author-avatar admin
25/09/2024
0
The G7 Cyber Expert Group (CEG) released a public statement Sept. 25 highlighting the potential cybersecurity risks to the financial se...
Continue reading
25 Sep
Blogs

Austria subjected to pro-Russian DDoS intrusions

Posted by author-avatar admin
25/09/2024
0
More than 40 Austrian organizations had their websites subjected to distributed denial-of-service attacks by pro-Russia hacktivist oper...
Continue reading
25 Sep
Blogs

Post-Quran burning cyberattack against Sweden attributed to Iran

Posted by author-avatar admin
25/09/2024
0
Such an attack was noted by Swedish officials to have been conducted to falsely portray the country's Islamophobia and increase polariz...
Continue reading
25 Sep
Blogs

Ukraine subjected to more targeted Russian cyberattacks

Posted by author-avatar admin
25/09/2024
0
Despite recording an 85% drop in critical and high-severity cyberattacks from Russian state-sponsored threat operations between the sec...
Continue reading
25 Sep
Blogs

Unmanaged IBM AIX server enabled Chinese compromise of US aerospace firm

Posted by author-avatar admin
25/09/2024
0
Initial compromise of a U.S.-based global aerospace engineering company's network had been achieved by a Chinese state-backed cyberespi...
Continue reading
25 Sep
Blogs

Concealed Fox Kitten infrastructure exposed

Posted by author-avatar admin
25/09/2024
0
Hackread reports that Iranian cyberespionage group Fox Kitten was discovered by Censys researchers to potentially launch future intrusi...
Continue reading
25 Sep
Blogs

Inadvertent North Korean IT worker hiring prevalent among Fortune 100 firms

Posted by author-avatar admin
25/09/2024
0
North Korean threat actors have been unknowingly employed by dozens of organizations on the Fortune 100 list for remote IT positions, a...
Continue reading
  • 1
  • 2

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account