Skip to main content
CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Yearly Archives: 2024

Home2024Page 68
Blogs

Telecom Acquisitions and KCOM sign strategic partnership 

Posted by author-avatar admin
06/11/2024
0
News The agreement is set to come into effect on November 19  Telecom Acquisitions Limited (TAL) has announced the signing of a wholesa...
Continue reading
06 Nov
Blogs

FBI: US facing escalating fraudulent emergency data requests

Posted by author-avatar admin
06/11/2024
0
Most recent evidence of ramping EDR exploitation was a posting of "high-quality" .gov emails, including U.S. credentials, on a hacking ...
Continue reading
06 Nov
Blogs

Market and Buyer’s Guide for Customer Identity and Access Management 2024

Posted by author-avatar admin
06/11/2024
0
A major challenge in CIAM is managing fragmented and unreliable identity data, with 75% of businesses facing issues from inconsistent d...
Continue reading
06 Nov
Blogs

Ongoing npm malware campaign involves Ethereum smart contracts

Posted by author-avatar admin
06/11/2024
0
Typosquatted packages for Puppeteer, Bignum.js, and 285 other libraries have been leveraged by threat actors to enable malware compromi...
Continue reading
06 Nov
Blogs

Singtel breach attributed to Volt Typhoon

Posted by author-avatar admin
06/11/2024
0
Attackers behind the Singtel breach utilized a web shell, noted sources close to the matter. Such a webshell was previously reported by...
Continue reading
06 Nov
Blogs

Novel ToxicPanda Android banking trojan used in global attacks

Posted by author-avatar admin
06/11/2024
0
Attacks with the newly emergent ToxicPanda Android banking trojan have compromised more than 1,500 Android devices around the world, wi...
Continue reading
06 Nov
Blogs

GenAI and Fraud | SC Media

Posted by author-avatar admin
06/11/2024
0
Generative Artificial Intelligence (GenAI) is a category of AI capable of producing new content, including audio, code, images, text, a...
Continue reading
06 Nov
Blogs

Ransomware attack disrupts Georgia hospital’s EHR system

Posted by author-avatar admin
06/11/2024
0
Investigation into the incident and examination of recovery options are underway, according to the hospital, which emphasized that the ...
Continue reading
06 Nov
Blogs

Active exploitation of Android vulnerabilities ongoing

Posted by author-avatar admin
06/11/2024
0
Leading the actively exploited bugs is an Android Framework privilege escalation issue, tracked as CVE-2024-43093, which could be utili...
Continue reading
06 Nov
Blogs

IBM Security Verify Access impacted by dozens of bugs

Posted by author-avatar admin
06/11/2024
0
IBM Security Verify Access, an authorization and network security policy management solution, was discovered by IT security researcher ...
Continue reading
  • «
  • ‹
  • 66
  • 67
  • 68
  • 69
  • 70
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
Create your first navigation menu here
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account