RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Security OperationsSeptember 15, 2022

The Week in Cybersecurity: U.S. mandates federal agencies use secure third-party software tools

A new U.S. federal government memo mandates the federal use of secure third-party software products and services. Also, Twitter whistleblower Mudge Zatko reveals new details of the company’s security practices (or lack thereof) with Congress.

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
The Week in Cybersecurity: U.S. mandates federal agencies use secure third-party software tools

Welcome to the latest edition of The Week in Cybersecurity, which brings you the newest headlines from both the world and our team about the most pressing topics in cybersecurity.

This week: A new U.S. federal government memo mandates the federal use of secure third-party software products and services. Also, Twitter whistleblower Mudge Zatko reveals new details of the company’s security practices (or lack thereof) with Congress.

This week’s top story

White House OMB memo mandates federal agencies secure their software products

Over a year ago, the Biden Administration released its famous Executive Order (14028) on Improving the Nation’s Cybersecurity, which called for the National Institute of Standards and Technology (NIST) to release guidance on secure software development. Now, several months later, the Office of Management and Budget (OMB) is following suit in complying with the Executive Order.

Yesterday, The White House shared that the OMB issued a memo calling upon the heads of executive departments and agencies to comply with NIST’s guidance in an effort to secure software utilized by the federal government. The guidance states that federal agencies can only use software that “complies with secure software development standards,” allowing the federal government to “quickly identify security gaps when new vulnerabilities are discovered” according to The White House.

The memo is applicable to any third-party software used by federal agencies that works to maintain the federal government’s information systems. However, the memo does not apply to software developed by the federal government itself. Instead, the memo strongly recommends that government-developed software follows NIST’s guidance.

It’s important to note that the memo does call for a two-way street. Equally responsible to the memo are federal agencies and departments, which can now only use software provided by software producers that can attest to complying fully with the NIST guidelines.

While this memo does not apply to all private sector software providers, this mandate does help to encourage that more software be developed securely. The software providers who are the fastest to comply with this memo will be the ones to secure a spot as one of the federal government’s software vendors. Software providers who fail to keep up with the NIST guidance however will lose the federal government as a paying customer.

News Roundup

Here are the stories we’re paying attention to this week…

Twitter whistleblower reveals employees concerned China agent could collect user data (Reuters)

Mudge Zatko, a famed hacker who served as Twitter's head of security until his firing in January, said some Twitter employees were concerned that the Chinese government would be able to collect data on the company's users.

New PsExec spinoff lets hackers bypass network security defenses (BleepingComputer)

Security researchers have developed an implementation of the Sysinternals PsExec utility that allows moving laterally in a network using a single, less monitored port, Windows TCP port 135.

FBI warns of unpatched and outdated medical device risk (Security Week)

A new piece of stealthy Linux malware called Shikitega has been uncovered adopting a multi-stage infection chain to compromise endpoints and IoT devices and deposit additional payloads.

CISA has released its Strategic Plan for 2023-25 (CISA)

The Cybersecurity and Infrastructure Security Agency’s (CISA) 2023-2025 Strategic Plan is the agency’s first, comprehensive strategic plan since CISA was established in 2018. This is a major milestone for the agency: It will focus and guide the agency’s efforts over the next three years.

SparklingGoblin APT hackers using new Linux variant of sidewalk backdoor (The Hacker News)

A Linux variant of a backdoor known as SideWalk was used to target a Hong Kong university in February 2021, underscoring the cross-platform abilities of the implant. ESET, which detected the malware in the university's network, attributed the backdoor to a nation-state actor dubbed SparklingGoblin.

A new international Joint Cybersecurity Advisory warns of Iranian-backed cybercriminals (CISA)

Several U.S. federal agencies and departments, along with similar agencies from Australia, Canada, and the U.K. have released a Joint Cybersecurity Advisory highlighting continued malicious cyber activity by APT actors that they assess are affiliated with the Iranian Government’s Islamic Revolutionary Guard Corps (IRGC).

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Security Operations

More Blog Posts

Post-quantum security

Crypto group ushers in post-quantum security

Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.

Learn More about Crypto group ushers in post-quantum security
Crypto group ushers in post-quantum security
Cybercrime-as-a-service

Cybercrime-as-a-service forces a security rethink

With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.

Learn More about Cybercrime-as-a-service forces a security rethink
Cybercrime-as-a-service forces a security rethink
AI adoption guardrails

Why governance is key to safe AI adoption

A new CSA report stresses getting out in front of AI risk — and why it matters for SecOps.

Learn More about Why governance is key to safe AI adoption
Why governance is key to safe AI adoption
Adversarial AI rise

Adversarial AI is on the rise: What you need to know

Researchers explain that as threat actors move to AI-enabled malware in active operations, existing defenses will fail.

Learn More about Adversarial AI is on the rise: What you need to know
Adversarial AI is on the rise: What you need to know

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top