Skip to main content
CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Daily Archives: 14/10/2024

Home2024October14
14 Oct
Blogs

Pentagon shares new cybersecurity rules for government contractors

Posted by author-avatar admin
14/10/2024
0
The U.S. Department of Defense introduced new cybersecurity requirements for companies that contract with the federal government.The Pe...
Continue reading
14 Oct
Blogs

Vulnerable instances of Log4j still being used nearly 3 years later

Posted by author-avatar admin
14/10/2024
0
Editor's note: This article originally appeared in our sister publication SC Magazine UK.Almost three years after the discovery of the ...
Continue reading
14 Oct
Blogs

Command-jacking used to launch malicious code on open-source platforms

Posted by author-avatar admin
14/10/2024
0
Entry points have been observed being attacked across multiple open-source environments with an aim towards launching supply chain atta...
Continue reading
14 Oct
Blogs

Novel techniques leveraged to fuel recent phishing campaigns

Posted by author-avatar admin
14/10/2024
0
Insurance and finance industry organizations have been targeted with the Remcos RAT payload as part of a new phishing attack involving ...
Continue reading
14 Oct
Blogs

US telcos, agencies sought for more Salt Typhoon hack info

Posted by author-avatar admin
14/10/2024
0
Major U.S. telecommunications firms AT&T, Verizon, and Lumen Technologies have been urged by House Energy and Commerce Committee le...
Continue reading
14 Oct
Blogs

CISA: Attacks exploiting F5 BIG-IP cookies underway

Posted by author-avatar admin
14/10/2024
0
Organizations have been warned by the Cybersecurity and Infrastructure Security Agency about ongoing attacks exploiting unencrypted F5 ...
Continue reading
14 Oct
Blogs

High-severity Windows vulnerability leveraged in new OilRig APT attacks

Posted by author-avatar admin
14/10/2024
0
Such newly secured funds will be leveraged by the firm, which offers a complete risk management platform for managed service providers,...
Continue reading
14 Oct
Blogs

Nearly 1 TB of Game Freak data leaked after breach

Posted by author-avatar admin
14/10/2024
0
Hackread reports that Japanese video game developer Game Freak, most famously known for the Pokemon franchise, has confirmed the theft ...
Continue reading
14 Oct
Blogs

Ransomware attack compromises Casio data

Posted by author-avatar admin
14/10/2024
0
Investigation into the incident revealed the exfiltration of personal data from Casio and its affiliates' permanent and temporary emplo...
Continue reading
14 Oct
Blogs

Fake crypto token leveraged by FBI in crypto fraud crackdown

Posted by author-avatar admin
14/10/2024
0
Cryptocurrency market makers CLS Global, MyTrade, and ZM Quant, and 15 other organizations and associated individuals have been arreste...
Continue reading
  • 1
  • 2

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
Create your first navigation menu here
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account