In the past I've discussed how central antivirus software "phone-back" URL locations can be easily used by U.S and international Intelligence Agencies including rogue nation-state or targeted threat actors for the purpose of hijacking them and feeding back malicious content similar to the U.S Intelligence Community's Top Secret program called "CAMBERDADA" which aims to collect malicious software samples from antivirus vendors which also includes Kaspersky using SIGINT by basically intercepting traffic courtesy of antivirus vendors and basically collecting the malicious software samples for research purposes.
Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Wednesday, March 30, 2022
The FCC Adds Kaspersky to Its List of National Security Threats
The FCC has recently added Kaspersky products to it's list of National Security Threats while the company publicly issued a statement claiming that the decision was made on political grounds. The company also cited yet another decision by the U.S DHS back in 2017 which basically forbids U.S based companies from doing business with the company.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment