News & Analysis as of

Cybersecurity Cyber Espionage

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Alston & Bird

6th Circuit Upholds 20-year Sentence of Chinese Spy, Convicted of Espionage Crimes, Attempting to Steal Trade Secrets

Alston & Bird on

On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more

King & Spalding

Executive Order Restricts Foreign Access to U.S. Data, Citing National Security Risks

King & Spalding on

On February 28, 2024, President Biden signed Executive Order (EO) 14117 titled “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” On March 5,...more

Holland & Knight LLP

White House, U.S. Coast Guard Seek to Address Maritime Cyber Espionage and Cybersecurity Risks

Holland & Knight LLP on

Topic Links Maritime trade is essential to America's economic viability and national security interests. The U.S. Marine Transportation System (MTS) – comprising an intricate system of ports, terminals, vessels, waterways and...more

Thomas Fox - Compliance Evangelist

Coming Conflict with China-Business Challenges and Responses: Cyber Spying and IP Theft

In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent...more

Ankura

Ankura CTIX FLASH Update - January 2023 - 4

Ankura on

PayPal Discloses December 2022 Security Incident Involving Credential Stuffing Attacks - PayPal has begun sending out notification letters to individuals impacted by a security incident that occurred in early December...more

Ankura

Ankura CTIX FLASH Update - January 2023 - 2

Ankura on

Health and Human Services Organization Discloses Ransomware Attack and Breach from Early 2022 - On January 5, 2023, Maternal & Family Health Services (MFHS) disclosed that a ransomware attack occurred on April 4, 2022, and...more

Ankura

Ankura CTIX FLASH Update - September 2022 - 3

Ankura on

Royal Ransomware Operation No Longer Residing in the Shadows - "Royal", a ransomware operation consisting of "a group of vetted and experienced ransomware actors from previous operations" and first discovered in January of...more

Ankura

Ankura CTIX FLASH Update - August 2022 - 2

Ankura on

Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more

Ankura

A Cyber Threat Analysis of the Russia-Ukraine Conflict

Ankura on

The Ankura Cyber Threat Investigations & Expert Services (CTIX) team conducted a technical analysis of historical and ongoing adversarial activity associated with the current Ukrainian/Russian conflict. In doing so, the CTIX...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Spy Games: How Insider/Outsider Threats Have Become the Newest Cybersecurity Legal Risk

Cybersecurity does not just pose technical challenges; companies must always keep their eye on the human component of cyber risk.  For example, even the most damaging and sophisticated hacks – such as the recent Twitter hacks...more

Troutman Pepper

New Cyber Threat Warnings And Guidance Issued For Health Care Entities Conducting COVID-19 Research

Troutman Pepper on

On May 21, the Federal Bureau of Investigation’s (FBI’s) Cyber Division released an FBI Flash warning recipients that nation-state cyber actors are targeting domestic universities, research institutes and private companies...more

Robinson+Cole Data Privacy + Security Insider

McAfee® Report Outlines Recent Threats from Q3 2018

For data security buffs like me, the recent McAfee® Labs Threats Report, December 2018 is, or should be, a top pick on the list. Well maybe not for the holiday reading list, and we need to be careful not to bring up the...more

King & Spalding

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

King & Spalding on

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

Dorsey & Whitney LLP

US China Trade War

Dorsey & Whitney LLP on

The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more

King & Spalding

Trade & Manufacturing - October 2015

King & Spalding on

Ending the Crude Oil Export Ban - On September 17, the House Energy and Commerce Committee passed a bill to end the 40-year-old ban on the export of domestic crude oil. The Committee vote was passed by a Republican...more

King & Spalding

Trade & Manufacturing - News of Note - October 2015

King & Spalding on

President Xi's State Visit Brings Announcements on Cybersecurity and Climate Change - In late September, Chinese President Xi Jinping made his first state visit to the United States. Cybersecurity and climate change...more

King & Spalding

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

King & Spalding on

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

King & Spalding

Project CAMERASHY Details Cyberespionage By China’s Military

King & Spalding on

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

Orrick - Trade Secrets Group

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Latham & Watkins LLP

Data Security Compliance and APTs: New Insights from "Putter Panda"

Latham & Watkins LLP on

On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more

Davis Wright Tremaine LLP

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

Blank Rome LLP

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

Blank Rome LLP on

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

Blank Rome LLP

Verizon’s Data Breach Report Reveals The Nine Most Pressing Corporate Security Threats

Blank Rome LLP on

As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world. Released Wednesday, the report,...more

Orrick - Trade Secrets Group

Pols Gone Wild: Congress Discovers Trade Secret Theft And Cybersecurity Are Problems; We Sort Through The Explosion Of Legislation

Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more

Troutman Pepper

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

Troutman Pepper on

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

29 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide