News & Analysis as of

Cyber Espionage China Cybersecurity

Alston & Bird

6th Circuit Upholds 20-year Sentence of Chinese Spy, Convicted of Espionage Crimes, Attempting to Steal Trade Secrets

Alston & Bird on

On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more

Thomas Fox - Compliance Evangelist

Coming Conflict with China-Business Challenges and Responses: Cyber Spying and IP Theft

In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent...more

Ankura

Ankura CTIX FLASH Update - August 2022 - 2

Ankura on

Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more

Dorsey & Whitney LLP

US China Trade War

Dorsey & Whitney LLP on

The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more

King & Spalding

Trade & Manufacturing - October 2015

King & Spalding on

Ending the Crude Oil Export Ban - On September 17, the House Energy and Commerce Committee passed a bill to end the 40-year-old ban on the export of domestic crude oil. The Committee vote was passed by a Republican...more

King & Spalding

Trade & Manufacturing - News of Note - October 2015

King & Spalding on

President Xi's State Visit Brings Announcements on Cybersecurity and Climate Change - In late September, Chinese President Xi Jinping made his first state visit to the United States. Cybersecurity and climate change...more

King & Spalding

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

King & Spalding on

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

King & Spalding

Project CAMERASHY Details Cyberespionage By China’s Military

King & Spalding on

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

Latham & Watkins LLP

Data Security Compliance and APTs: New Insights from "Putter Panda"

Latham & Watkins LLP on

On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more

Davis Wright Tremaine LLP

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

Blank Rome LLP

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

Blank Rome LLP on

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

Troutman Pepper

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

Troutman Pepper on

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

BakerHostetler

APT Threat Report Shows Cybersecurity Risks Not Limited to Identity Theft

BakerHostetler on

We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide