Skip to main content
CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Posts by admin

HomeArticles Posted by adminPage 61
09 Dec
Blogs

Croatian port claimed to be breached by 8Base ransomware

Posted by author-avatar admin
09/12/2024
0
Information allegedly exfiltrated by 8Base included invoices, receipts, personal and confidential data, accounting documents, employmen...
Continue reading
09 Dec
Blogs

Over 585K compromised in Atrium Health breach

Posted by author-avatar admin
09/12/2024
0
SecurityWeek reports that U.S. healthcare company Atrium Health had data from more than 585,000 individuals exposed following a breach ...
Continue reading
09 Dec
Blogs

Ransomware impacts more than 310K Anna Jacques Hospital patients

Posted by author-avatar admin
09/12/2024
0
Investigation into the incident, which was only finalized earlier last month, revealed that Money Message was able to exfiltrate indivi...
Continue reading
09 Dec
Blogs

NCSC expects continued relationship with CISA under Trump

Posted by author-avatar admin
09/12/2024
0
Apprehensions regarding a possible politically charged leadership at the Cybersecurity and Infrastructure Security Agency under the inc...
Continue reading
09 Dec
Blogs

Forced exposure: Few SMBs adequately protect themselves against cyberattacks

Posted by author-avatar admin
09/12/2024
0
Most small and medium-sized businesses across the U.S. worry about the potential financial and reputational loss resulting from cyberat...
Continue reading
09 Dec
Blogs

Novel payloads added to More_eggs MaaS operator’s arsenal

Posted by author-avatar admin
09/12/2024
0
Attacks with the newly emergent RevC2 information-stealing malware and Venom Loader malware loader have been launched by malware-as-a-s...
Continue reading
09 Dec
Blogs

Supply chain attack compromises Ultralytics AI model

Posted by author-avatar admin
09/12/2024
0
With the installation of Ultralytics 8.3.41 and 8.3.42 made available on the Python Package Index repository on Thursday reported by us...
Continue reading
09 Dec
Blogs

Bogus video conferencing app leveraged for Realst infostealer delivery

Posted by author-avatar admin
09/12/2024
0
Individuals in the Web3 sector have been subjected to a novel scam campaign that distributes the Realst information-stealing malware th...
Continue reading
09 Dec
Blogs

Ongoing RedLine stealer campaign facilitated by cracked corporate software

Posted by author-avatar admin
09/12/2024
0
Well-known online forums have been leveraged to spread the cracked software, which was claimed by threat actors to function only if tar...
Continue reading
09 Dec
Blogs

Unpatched vulnerabilities: The powder keg fueling ransomware attacks

Posted by author-avatar admin
09/12/2024
0
Ransomware attacks continue to dominate the cybersecurity threat landscape, with organizations of all sizes grappling with the devastat...
Continue reading
  • «
  • ‹
  • 59
  • 60
  • 61
  • 62
  • 63
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
Create your first navigation menu here
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account