CNB aims for win-win growth, communicating, innovating and developing with our partners...
Login / Register
Sign inCreate an Account

Lost your password?

Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Yearly Archives: 2024

Home2024Page 167
20 Aug
Blogs

Bugs in Microsoft apps for macOS could give privileges to attackers

Posted by author-avatar admin
20/08/2024
0
Eight vulnerabilities in six leading Microsoft applications for macOS — including Outlook, Teams, PowerPoint, OneNote, Excel and Word —...
Continue reading
20 Aug
Blogs

Critical Jenkins vulnerability added to CISA’s known vulnerabilities catalog

Posted by author-avatar admin
20/08/2024
0
A critical vulnerability in the Jenkins open-source continuous integration/continuous delivery (CI/CD) automation server, which could l...
Continue reading
20 Aug
Blogs

TP-Link finds itself in congressional crosshairs over ties to China

Posted by author-avatar admin
20/08/2024
0
Networking vendor TP-Link found itself under scrutiny from Congress over its links to the Chinese government.In an open letter (PDF) to...
Continue reading
20 Aug
Blogs

Why Cyber Resilience Matters – Theresa Lanowitz – BSW #361

Posted by author-avatar admin
20/08/2024
0
Theresa Lanowitz is the Chief Cybersecurity Evangelist at LevelBlue, a strategic alliance between AT&T and WillJam Ventures, that s...
Continue reading
04 Jul
Blogs

Breaking the Illusion: How some CEOs’ Perceptions of Hacking Differ from Reality

Posted by author-avatar admin
04/07/2024
0
Hollywood has given us an unrealistic (with the exception of Mr. Robot) and exaggerated portrayal of hacking in movies and TV shows. Fr...
Continue reading
04 Jul
Blogs

PR Implications After a Cyberattack | OTIFYD

Posted by author-avatar admin
04/07/2024
0
Guidelines for Effective Crisis Response Cyberattacks on critical infrastructure can have devastating consequences, including negative ...
Continue reading
04 Jul
Blogs

How to shut down a plant remotely in 3 seconds.

Posted by author-avatar admin
04/07/2024
0
How to shut down a plant remotely in 3 seconds. 3…2…1… and boom! USBKill Remote Trigger In my hand, I have a remote trigger that can fr...
Continue reading
04 Jul
Blogs

OTIFYD and Waterfall Security Partner to Secure OT Networks

Posted by author-avatar admin
04/07/2024
0
  London, United Kingdom, April 4, 2023: OTIFYD, EMEA’s next generation OT security services and solutions provider , and Waterfall Sec...
Continue reading
04 Jul
Blogs

Cascading Supply Chain Attack – OTIFYD

Posted by author-avatar admin
04/07/2024
0
In recent years, supply chain attacks have become one of the most significant threats to cybersecurity. Hackers are using these attacks...
Continue reading
04 Jul
Blogs

Hacking Controller Area Network (CAN Bus)

Posted by author-avatar admin
04/07/2024
0
Hacking Controller Area Network (CAN Bus) What is Controller Area Network (CAN Bus)? In short words, it’s a communication system made f...
Continue reading
  • «
  • ‹
  • 165
  • 166
  • 167
  • 168
  • ›

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account