CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Monthly Archives: October 2024

Home2024OctoberPage 21
18 Oct
Blogs

North Korean fake IT worker scheme evolves to include extortion

Posted by author-avatar admin
18/10/2024
0
North Korean threat operation NICKEL TAPESTRY has bolstered its cyberattacks involving fake IT workers against organizations in the U.S...
Continue reading
18 Oct
Blogs

Expanded attacks deployed by SideWinder APT

Posted by author-avatar admin
18/10/2024
0
Numerous high-profile organizations, including government and military entities, financial companies, and telecommunications firms, acr...
Continue reading
18 Oct
Blogs

Oktane 2024: Partners talk of collaboration plans

Posted by author-avatar admin
18/10/2024
0
Throughout its 2024 Oktane conference, identity management provider Oktane talked up its plans to expand its partner ecosystem.Executiv...
Continue reading
18 Oct
Blogs

Novel RomCom RAT variant launched against Ukraine, Poland

Posted by author-avatar admin
18/10/2024
0
Attacks with the latest RomCom RAT variant called SingleCamper, also known as RomCom 5.0 and SnipBot, have been deployed by Russian thr...
Continue reading
18 Oct
Blogs

Infostealers deployed via phony Google Meet alerts

Posted by author-avatar admin
18/10/2024
0
Attacks involved the display of fraudulent Google Meet popup alerts, which would download the StealC or Rhadamanthys infostealers for W...
Continue reading
18 Oct
Blogs

Globe Life extorted following subsidiary breach

Posted by author-avatar admin
18/10/2024
0
Information compromised as a result of the incident included individuals' names, addresses, Social Security numbers, and health-related...
Continue reading
18 Oct
Blogs

BianLian admits responsibility for Boston Children’s Health Physicians hack

Posted by author-avatar admin
18/10/2024
0
In a post on its extortion portal earlier this week, BianLian alleged the theft of BCHP's emails, finance and HR data, personally ident...
Continue reading
18 Oct
Blogs

Casio ransomware recovery remains bleak

Posted by author-avatar admin
18/10/2024
0
Immediate action to contain the intrusion via server takedowns has affected shipments although only Japanese customers are believed to ...
Continue reading
18 Oct
Blogs

US arrests, indicts hacker of SEC’s X account

Posted by author-avatar admin
18/10/2024
0
Such a breach was conducted through SIM swapping, with Eric Council Jr., also known as Easymunny, Ronin, and AGiantSchnauzer, and his c...
Continue reading
18 Oct
Blogs

Microsoft customer security logs misplaced due to vulnerability

Posted by author-avatar admin
18/10/2024
0
Microsoft had its enterprise customers' security logs for tracking suspicious network traffic and behavior improperly gathered between ...
Continue reading
  • «
  • ‹
  • 19
  • 20
  • 21
  • 22
  • 23
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account