Tuesday, February 25, 2025
HomeSecurity NewsRussia Government to Fine the Search Engines Linked to Banned VPN and...

Russia Government to Fine the Search Engines Linked to Banned VPN and Internet proxy services

Published on

SIEM as a Service

Follow Us on Google News

Russian government proposed a bill to fine search engines that linking users to banned VPN services and other anonymizers. Also the law fines search engines if they provide details on blocked sites.

According to Duma, if the individual breaks the law they will be fined in range between 3,000 and 5,000 rubles, for officials 50,000 rubles and legal entities will be fined between 500,000 to 700,000 rubles.

VPN & Proxy

VPN allows you to create a virtual network like a local one, but the computers are not physically connected to each other. It is also capable of transferring corporate IP traffic using the secure protocol.

Proxy Server has been used in enormous cases where some personal data or information have been misused illegally against an entity in the past. The proxy server is also designed to build up a wall between the user and the internet.

Search Engines in Russia

Yandex and Google cover most of the search engine market in Russia, according to StatCounter they have the market share of 96.35%.

Russia has been attempting to strengthen internet censorship, from the mid of 2017, hundreds of websites that contain illegal content are blocked at ISP level and that leads to the continuous growth of VPN service in Russia.

What exactly is banned?

The VPN and Proxy service providers that get access to the blacklisted websites are banned, and the VPN operators should register themselves with Government regularity authority.

Search engines like Google and Yandex should shield users from accessing to the banned websites says banki.ru.

The law comes into force after 90 days from the publication and those who failed to comply the system will be fined and placed in the blocked list maintained by Russian telecoms watchdog Roscomnadzor.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s...

INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s

INE, the leading provider of networking and cybersecurity training and certifications, today announced its...

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...