Skip to main content
CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Yearly Archives: 2024

Home2024Page 46
26 Nov
Blogs

Growth in phishing, changes in ransomware crews mark threat landscape

Posted by author-avatar admin
26/11/2024
0
Phishing attacks continue to dominate the security landscape, though other avenues for cybercrime are seeing growth in popularity, acco...
Continue reading
26 Nov
Blogs

Get ready for the high-risk Xmas holiday shopping season

Posted by author-avatar admin
26/11/2024
0
COMMENTARY: The holiday shopping season features a lot of chaos: rushed decisions, urgent sales, and last-minute gift hunting. While sh...
Continue reading
Blogs

Australia regulator dishes out midband spectrum for private networks

Posted by author-avatar admin
26/11/2024
0
News The newly allocated area-wide licences (AWLs) will allow organisations to build their own private wireless networks This week, the...
Continue reading
26 Nov
Blogs

Phishing attacks via ‘URL rewriting’ to evade detection escalate

Posted by author-avatar admin
26/11/2024
0
Email attackers are increasingly exploiting “URL rewriting” in phishing attacks to evade detection while spreading malicious links, Per...
Continue reading
26 Nov
Blogs

2nd Edition: How to Measure Anything in Cybersecurity Risk – Doug Hubbard – BSW Vault

Posted by author-avatar admin
26/11/2024
0
Mr. Hubbard is the inventor of the powerful Applied Information Economics (AIE) method. His management consulting career started 35 yea...
Continue reading
25 Nov
Blogs

Avast anti-rootkit driver used to seize control of infected systems

Posted by author-avatar admin
25/11/2024
0
A malicious campaign was recently observed that uses a legitimate, but outdated, Avast anti-rootkit driver and then manipulates it to t...
Continue reading
25 Nov
Blogs

Social engineering becomes lucrative business for North Korean hackers

Posted by author-avatar admin
25/11/2024
0
Deployment of credential and cryptocurrency stealing malware has been conducted by Sapphire Sleet not only through the impersonation of...
Continue reading
25 Nov
Blogs

Asia, Europe subjected to Russian cyberespionage campaign

Posted by author-avatar admin
25/11/2024
0
TAG-110 leveraged vulnerable internet-exposed web apps and phishing emails to facilitate the delivery of the HATVIBE app loader that tr...
Continue reading
25 Nov
Blogs

Ransomware and exploits surge: Urgent cyber threat insights and critical moves for 2025

Posted by author-avatar admin
25/11/2024
0
Cybersecurity leaders face a high-stakes environment where the speed and sophistication of threats continue to rise, demanding more pro...
Continue reading
25 Nov
Blogs

Neighboring Wi-Fi networks exploited in APT28 attack

Posted by author-avatar admin
25/11/2024
0
Newly discovered nearest neighbor targeting, or the compromise of neighboring Wi-Fi networks, had been leveraged by Russian state-backe...
Continue reading
  • «
  • ‹
  • 44
  • 45
  • 46
  • 47
  • 48
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
Create your first navigation menu here
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account