CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Monthly Archives: October 2024

Home2024October
31 Oct
Blogs

Malware operators use copyright notices to lure in businesses

Posted by author-avatar admin
31/10/2024
0
The threat of a copyright infringement claim has become the latest way for malware operators to trick their targets.Researchers with Ci...
Continue reading
31 Oct
Blogs

Fake product listings on real shopping sites lead to stolen payment information

Posted by author-avatar admin
31/10/2024
0
More than 1,000 legitimate shopping sites have been compromised to promote fake product listings in a credit card phishing scheme dubbe...
Continue reading
31 Oct
Blogs

Beyond firewalls: The role of managed services in comprehensive security

Posted by author-avatar admin
31/10/2024
0
The dizzying pace of workspace digital evolution in the past decade has brought us cloud computing, remote work, bring your own device ...
Continue reading
31 Oct
Blogs

EmeraldWhale steals 15,000 credentials from exposed Git configurations

Posted by author-avatar admin
31/10/2024
0
A bad actor identified as EmeraldWhale was observed running a global operation that targeted exposed Git configurations — a campaign th...
Continue reading
Blogs

BT expands Carbon Network Dashboard for more granular emissions tracking  

Posted by author-avatar admin
31/10/2024
0
News   The upgrade will allow business customers a better understanding of the emissions related to individual apps and workloads  BT h...
Continue reading
Blogs

EU gives €127m funding boost to 6G research 

Posted by author-avatar admin
31/10/2024
0
News The funding will focus on 6G innovation and sustainable network development  At the 5G-Techritory event this week, Smart Networks ...
Continue reading
Blogs

Thai Airways deploys Juniper’s AI-Native Networking Platform

Posted by author-avatar admin
31/10/2024
0
Press Release Juniper Networks, a leader in secure, AI-Native Networking, today announced that Thai Airways has modernized the network ...
Continue reading
31 Oct
Blogs

Massive cloud credential theft conducted via exposed Git configuration breach

Posted by author-avatar admin
31/10/2024
0
BleepingComputer reports that more than 15,000 cloud account credentials belonging to private repositories have been exfiltrated by the...
Continue reading
31 Oct
Blogs

Phony CAPTCHAs exploited in Lumma, Amadey trojan campaign

Posted by author-avatar admin
31/10/2024
0
Threat actors have leveraged fraudulent CAPTCHAs to facilitate the deployment of the Lumma information-stealing malware and Amadey botn...
Continue reading
31 Oct
Blogs

New Facebook-targeted malvertising deploys SYS01 infostealer

Posted by author-avatar admin
31/10/2024
0
Attackers leveraged pernicious ads to lure targets into downloading ZIP packages with the malicious Electron app in the guise of legiti...
Continue reading
  • 1
  • 2
  • 3
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account