CNB aims for win-win growth, communicating, innovating and developing with our partners...
Login / Register
Sign inCreate an Account

Lost your password?

Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Yearly Archives: 2024

Home2024Page 165
29 Aug
Blogs

Guilty plea entered by ex-Verizon employee for spying for China

Posted by author-avatar admin
29/08/2024
0
The U.S. Department of Justice announced that former Verizon employee Ping Li has admitted his involvement in conspiring with China's M...
Continue reading
29 Aug
Blogs

Persistent GreasyOpal CAPTCHA solver detailed

Posted by author-avatar admin
29/08/2024
0
Hacking tool developer Greasy Opal has had its CAPTCHA bypass solution leveraged by several threat operations and substantially improve...
Continue reading
29 Aug
Blogs

BlackByte ransomware group targets VMware ESXi bug

Posted by author-avatar admin
29/08/2024
0
The BlackByte ransomware group was observed exploiting a recent authentication bypass vulnerability in VMware ESXi, a technique that de...
Continue reading
29 Aug
Blogs

Iran-backed hackers partner with ransomware gangs, CISA advisory warns

Posted by author-avatar admin
29/08/2024
0
Iran state-sponsored hackers collaborated with ransomware gangs to breach and extort U.S.-based organizations, a Cybersecurity and Infr...
Continue reading
28 Aug
Blogs

Karakurt ransomware negotiator indicted | SC Media

Posted by author-avatar admin
28/08/2024
0
Russian ransomware operation Karakurt member Deniss Zolotarjovs has been indicted in the U.S. for his involvement as a "cold case" nego...
Continue reading
28 Aug
Blogs

2024 SC Awards Finalists: All finalist profiles

Posted by author-avatar admin
28/08/2024
0
2024 SC Awards Finalists: All finalist profiles Source link
Continue reading
28 Aug
Blogs

Vulnerability Management: Tips and Techniques – John Kellerhals – CSP #189

Posted by author-avatar admin
28/08/2024
0
John Kellerhals, CISO at a nationwide MSSP, has more than 20 years of experience in information security, incident response, governance...
Continue reading
28 Aug
Blogs

Five traits of highly effective vulnerability management programs

Posted by author-avatar admin
28/08/2024
0
The vulnerability landscape constantly evolves, with new and newly-exploited vulnerabilities emerging at any moment. We are nearing a q...
Continue reading
28 Aug
Blogs

‘ASCII Smuggling’ attack exposes sensitive Microsoft Copilot data

Posted by author-avatar admin
28/08/2024
0
A patched vulnerability in Microsoft 365 Copilot could expose sensitive data by running a novel AI-enabled technique known as "ASCII Sm...
Continue reading
28 Aug
Blogs

Hunters International ransomware gang threatens to leak US Marshals data

Posted by author-avatar admin
28/08/2024
0
The Hunters International ransomware group is threatening to leak what it claims to be 386 GB of data from the U.S. Marshals Service (U...
Continue reading
  • «
  • ‹
  • 163
  • 164
  • 165
  • 166
  • 167
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account