23 juin 2024 | International, Sécurité

U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban

US Treasury sanctions 12 Kaspersky executives, citing cyber threats. Company and CEO unaffected. Follows Commerce Dept. ban on Kaspersky software.

https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html

Sur le même sujet

  • BAE Systems wins $30M in naval IT contracts

    13 novembre 2020 | International, Naval

    BAE Systems wins $30M in naval IT contracts

    Andrew Eversden WASHINGTON — BAE Systems was awarded two task order contracts to provide and integrate an information warfare platform aboard five U.S. Navy vessels, the company announced Nov. 11. Under the two task orders, worth more than $30 million, BAE will integrate the platforms into the Navy's Consolidated Afloat Network Enterprise Services — the Navy's tactical afloat network. "These two task orders permit us to continue our high-quality, high volume production and integration service, assembling and delivering CANES to the Navy safely and affordably,” Mark Keeler, vice president and general manager of BAE Systems' Integrated Defense Solutions business, said in a statement. “CANES takes advantage of commercial-off-the-shelf insertion, which brings operational agility to the warfighter and savings to the U.S. Navy.” Under the first task order, BAE will produce two fully integrated CANES racks for two Blue Ridge-class command ships, according to the release. That work is expected to be completed by February 2022. The company will provide the same services for two Arleigh Burke-class destroyers and a Virginia-class submarine under the second task order, expected to be completed by March 2022. Work will be performed at the BAE Systems facility in Summerville, South Carolina. Naval Information Warfare Systems Command in San Diego, California, awarded the contracts. BAE Systems also announced earlier this week that it won a five-year, $94 million indefinite delivery, indefinite quantity contract to deliver engineering, test and evaluation support for sensors, in addition to communication, control, and weapons systems for manned and unmanned air platforms. The contract was awarded by the Naval Air Warfare Center Aircraft Division. "We are bringing new advanced technologies such as artificial intelligence and autonomy to the Airborne Systems Integration Division,” Keeler said in a news release. “Our state-of-the-art digital engineering capabilities, and extensive experience in integrating airborne systems are further strengthening the warfighter's ability to meet mission requirements and ensuring combat readiness in the field.” https://www.c4isrnet.com/battlefield-tech/it-networks/2020/11/12/bae-systems-wins-several-naval-it-contracts/

  • New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks

    11 septembre 2024 | International, C4ISR, Sécurité

    New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks

    New RAMBO attack exploits radio signals from RAM to steal data from air-gapped networks, posing cybersecurity risks.

  • Pentagon needs access to defense companies’ networks to hunt cyberthreats, says commission

    31 juillet 2020 | International, C4ISR, Sécurité

    Pentagon needs access to defense companies’ networks to hunt cyberthreats, says commission

    Mark Pomerleau WASHINGTON — The Pentagon must be able to hunt cyberthreats on the private networks of defense companies in order to strengthen national cybersecurity, according to one of the leaders of the Cyber Solarium Commission. Rep. Mike Gallagher, R-Wis., who co-chairs the commission, said in testimony before the House Armed Services Subcommittee on Intelligence and Emerging Threats and Capabilities that there must be greater visibility of these networks, in which much sensitive and classified information is kept. “I think one of our biggest findings in the report was that while we are getting a better awareness of our own systems, we still — down to the level of some of our DoD contractors, subcontractors, all the small companies that work with the big defense primes — don't have the level of visibility on the threat picture and the security of their networks that we need,” he said July 30. “I just would argue that we need to figure that piece out because we just can't be in the process of reacting to cyber intrusions after the fact. We have to identify those threats at a quicker timeline at which our adversaries can break out on networks.” The Cyber Solarium Commission is a bipartisan organization created in the 2019 to develop a multipronged U.S. cyber strategy. The commission's report, released in March, recommended Congress require the defense industrial base participate in threat intelligence sharing programs and threat hunting on their networks. “Improving the detection and mitigation of adversary cyber threats to the DIB [defense industrial base] is imperative to ensuring that key military systems and functions are resilient and can be employed during times of crisis and conflict,” the report stated. China has been accused of pilfering reams of data from the networks of defense companies, including plans for the F-35 fighter jet and sensitive data on U.S. Navy programs that, while not classified by themselves, can collectively provide vast strategic insight into Navy plans and operations, officials claim. The commission's report recommended that a threat-hunting program include Department of Defense threat assessment programs on DIB networks; incentives for companies to feed data collected from threat hunting to the DoD and the National Security Agency's cybersecurity directorate; and coordination of DoD efforts with the Department of Homeland Security and the FBI. Congress is calling for the creation of a threat-sharing model in this year's defense authorization bill. The Senate's version includes a provision to direct the defense secretary to establish a threat intelligence program “to share threat intelligence with, and obtain threat intelligence from, the defense industrial base.” https://www.c4isrnet.com/cyber/2020/07/30/pentagon-needs-access-to-defense-companies-networks-to-hunt-cyberthreats-says-commission/

Toutes les nouvelles