CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Monthly Archives: December 2024

Home2024DecemberPage 29
09 Dec
Blogs

Supply chain attack compromises Ultralytics AI model

Posted by author-avatar admin
09/12/2024
0
With the installation of Ultralytics 8.3.41 and 8.3.42 made available on the Python Package Index repository on Thursday reported by us...
Continue reading
09 Dec
Blogs

Bogus video conferencing app leveraged for Realst infostealer delivery

Posted by author-avatar admin
09/12/2024
0
Individuals in the Web3 sector have been subjected to a novel scam campaign that distributes the Realst information-stealing malware th...
Continue reading
09 Dec
Blogs

Ongoing RedLine stealer campaign facilitated by cracked corporate software

Posted by author-avatar admin
09/12/2024
0
Well-known online forums have been leveraged to spread the cracked software, which was claimed by threat actors to function only if tar...
Continue reading
09 Dec
Blogs

Unpatched vulnerabilities: The powder keg fueling ransomware attacks

Posted by author-avatar admin
09/12/2024
0
Ransomware attacks continue to dominate the cybersecurity threat landscape, with organizations of all sizes grappling with the devastat...
Continue reading
09 Dec
Blogs

At a glance: How unpatched vulnerabilities feed ransomware attacks

Posted by author-avatar admin
09/12/2024
0
Unpatched vulnerabilities are a top priority for ransomware attackers, offering them a straightforward entry point into corporate syste...
Continue reading
09 Dec
Blogs

Expect more offensive cyber ops once Trump takes office

Posted by author-avatar admin
09/12/2024
0
COMMENTARY: Nothing encapsulates the cybersecurity challenge for the incoming administration more than the oft-quoted statement by Gen....
Continue reading
Blogs

IBM and Samsung poised to win £900m Emergency Services Network contract over BT 

Posted by author-avatar admin
09/12/2024
0
News  The news comes after BT signed a separate ESN contract last week  IBM and Samsung are set to secure a £895m contract to deliver u...
Continue reading
09 Dec
Blogs

US subjected to ongoing Chinese cyberespionage campaign

Posted by author-avatar admin
09/12/2024
0
Intrusions against U.S. critical infrastructure and government agencies have been deployed by Chinese state-backed cyberespionage opera...
Continue reading
09 Dec
Blogs

Cybercrime techniques leveraged for child-targeted crimes

Posted by author-avatar admin
09/12/2024
0
CyberScoop reports that social engineering, SIM swapping, and other cybercrime techniques have been exploited by global threat collecti...
Continue reading
09 Dec
Blogs

Novel Earth Minotaur hackers’ surveillance operation uncovered

Posted by author-avatar admin
09/12/2024
0
Attacks with an updated MOONSHINE exploit kit have been launched by newly emergent threat operation Earth Minotaur to compromise Window...
Continue reading
  • «
  • ‹
  • 27
  • 28
  • 29
  • 30
  • 31
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account