Tuesday, March 4, 2025
HomeSecurity NewsTrump Signs Bill Banning on the Kaspersky Security Products from use of...

Trump Signs Bill Banning on the Kaspersky Security Products from use of US Government

Published on

SIEM as a Service

Follow Us on Google News

The controversy has gone months, and finally, President Trump signs the law on Tuesday which imposes the ban on Kaspersky from Federal use.

Last September Department of Homeland Security (DHS) release immediate order to Federal executive branch departments and agencies to take actions related to the use or presence of information security products, solutions, and services supplied directly or indirectly by AO Kaspersky Lab or related entities.

Ban imposed due to a lot of spying activity Controversy against the Kaspersky Products.They are in use by all US Government Agencies including NSA.

This incident reported by The Wall Street Journal says Russian Government Hackers are using Kaspersky software to stole NSA advance cyber weapons such as secret spying tools from NSA contractor personal Home Computer who has been employed the Russian Based Kaspersky Security Products.

Kaspersky continues to deny that they have not tied up with any government and it would not help a government with cyber espionage.Also, the company said they could open source code for review.

On Tuesday, Christopher Krebs, a senior cybersecurity official at the Department of Homeland Security, told that nearly all government agencies had fully removed Kaspersky products from their networks in compliance with the September order, reported Reuters.

Ban imposed according to SEC. 1634. According to the ban No department, agency, organization, or other element of the Federal Government may use, whether directly or through work with or on behalf of another department, agency, organization, or element of the Federal Government, any hardware, software, or services developed or provided, in whole or in part.

(1) Kaspersky Lab (or any successor entity);

(2) any entity that controls is controlled by, or is under common control with Kaspersky Lab; or

(3) any entity of which Kaspersky Lab has majority ownership.

The case against Kaspersky is well-documented and deeply concerning. This law is long overdue, and I appreciate the urgency of my bipartisan colleagues on the Senate Armed Services Committee to remove this threat from government systems,” Shaheen wrote in a press release.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...