Saturday, February 8, 2025
HomeSecurity NewsTrump Signs Bill Banning on the Kaspersky Security Products from use of...

Trump Signs Bill Banning on the Kaspersky Security Products from use of US Government

Published on

SIEM as a Service

Follow Us on Google News

The controversy has gone months, and finally, President Trump signs the law on Tuesday which imposes the ban on Kaspersky from Federal use.

Last September Department of Homeland Security (DHS) release immediate order to Federal executive branch departments and agencies to take actions related to the use or presence of information security products, solutions, and services supplied directly or indirectly by AO Kaspersky Lab or related entities.

Ban imposed due to a lot of spying activity Controversy against the Kaspersky Products.They are in use by all US Government Agencies including NSA.

This incident reported by The Wall Street Journal says Russian Government Hackers are using Kaspersky software to stole NSA advance cyber weapons such as secret spying tools from NSA contractor personal Home Computer who has been employed the Russian Based Kaspersky Security Products.

Kaspersky continues to deny that they have not tied up with any government and it would not help a government with cyber espionage.Also, the company said they could open source code for review.

On Tuesday, Christopher Krebs, a senior cybersecurity official at the Department of Homeland Security, told that nearly all government agencies had fully removed Kaspersky products from their networks in compliance with the September order, reported Reuters.

Ban imposed according to SEC. 1634. According to the ban No department, agency, organization, or other element of the Federal Government may use, whether directly or through work with or on behalf of another department, agency, organization, or element of the Federal Government, any hardware, software, or services developed or provided, in whole or in part.

(1) Kaspersky Lab (or any successor entity);

(2) any entity that controls is controlled by, or is under common control with Kaspersky Lab; or

(3) any entity of which Kaspersky Lab has majority ownership.

The case against Kaspersky is well-documented and deeply concerning. This law is long overdue, and I appreciate the urgency of my bipartisan colleagues on the Senate Armed Services Committee to remove this threat from government systems,” Shaheen wrote in a press release.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...

Google Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown

In a continued commitment to enhancing user safety and trust, Google has outlined significant...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...