CNB aims for win-win growth, communicating, innovating and developing with our partners...
Login / Register
Sign inCreate an Account

Lost your password?

Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Monthly Archives: January 2025

Home2025JanuaryPage 3
23 Jan
Blogs

Think like an attacker: Increase attack surface visibility with integrated exposure management

Posted by author-avatar admin
23/01/2025
0
Today’s cyber defenders are working from a siloed set of security signals, capabilities, and visibility. This model creates gaps in def...
Continue reading
23 Jan
Blogs

Think like an attacker: Increase attack surface visibility with integrated exposure management

Posted by author-avatar admin
23/01/2025
0
Today’s cyber defenders are working from a siloed set of security signals, capabilities, and visibility. This model creates gaps in def...
Continue reading
23 Jan
Blogs

Think like an attacker: Increase attack surface visibility with integrated exposure management

Posted by author-avatar admin
23/01/2025
0
Today’s cyber defenders are working from a siloed set of security signals, capabilities, and visibility. This model creates gaps in def...
Continue reading
Blogs

Google further increases stake in Anthropic by $1 billion  

Posted by author-avatar admin
23/01/2025
0
News  The news brings Google’s total investment in the AI specialist to $3 billion and builds on their existing 10% ownership share  Go...
Continue reading
23 Jan
Blogs

RansomHub lays claim on American Standard, Grohe breaches

Posted by author-avatar admin
23/01/2025
0
In a post on its leak site on Wednesday, RansomHub asserted that it was able to exfiltrate 400 GB of data from American Standard's netw...
Continue reading
23 Jan
Blogs

Over 70M purportedly compromised in PowerSchool hack

Posted by author-avatar admin
23/01/2025
0
Infiltration of PowerSchool's student information systems via stolen customer support portal credentials has primarily impacted the Tor...
Continue reading
23 Jan
Blogs

New Chinese cyberespionage campaign targeted South Korean VPN service

Posted by author-avatar admin
23/01/2025
0
Organizations across East Asia, including a semiconductor firm and software development company in South Korea and others in China and ...
Continue reading
23 Jan
Blogs

Malware deployed via new ClickFix attack variant using Silk Road founder as lure

Posted by author-avatar admin
23/01/2025
0
Attackers who made fraudulent but verified Ross Ulbricht accounts on X, formerly Twitter, sought to lure users into joining Telegram ch...
Continue reading
23 Jan
Blogs

Ivanti CSA exploit chains examined in joint CISA, FBI advisory

Posted by author-avatar admin
23/01/2025
0
Attacks with the chained vulnerabilities have been thwarted by three organizations, with the first preventing compromise following sysa...
Continue reading
23 Jan
Blogs

Widespread AIRASHI botnet detailed in new report

Posted by author-avatar admin
23/01/2025
0
Intrusions exploiting a Cambium Networks cnPilot router zero-day have been launched by threat actors to facilitate the distribution of ...
Continue reading
  • ‹
  • 1
  • 2
  • 3
  • 4
  • 5
  • ›
  • »

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account