Ask a CFIUS Expert: Is Crypto Spying on Us?
Hot Topics in International Trade-Braumiller Law Group-FDI Into Mexico from China
4 Key Takeaways | Solar Industry & Chinese Tariff Update
10 Key Trade Developments: Trade Remedy Cases
Episode 309 -- Alex Cotoia on Compliance with the Uyghur Forced Labor Prevention Act
10 Key Trade Developments: China
Noteworthy Points in the Rules for the Implementation of China's Patent Law 2023
JONES DAY TALKS®: Corporate Compliance in Asia: Managing Rapid Regulatory Change and Ambiguity
Hot Topics in International Trade. Braumiller Law Group Partner & Founder Adrienne Braumiller joins Vp of Marketing Bob Brewer for an Update on Forced Labor
Episode 292 -- 3M's $6.5 Million FCPA Settlement with the SEC
5 Key Takeaways | How to Effectively Leverage the Chinese Patent System
Third Party Observation in Patent Prosecution in China
The Grace Period for Novelty in Chinese Patent Law
One Month to a More Effective Compliance Program with Boards – Day 14 - Boards and Doing Business in China
Episode 276 -- Review of Phillips and Franks Int'l SEC FCPA Settlements
Sanction and the Increasing Complexity of Trade Compliance
Braumiller Law Group Help With China Imports
Coming Conflict with China: Part 5 - Good Compliance Is Good Business
JONES DAY PRESENTS®: Taiwan's Enhanced Trade Secret Restrictions and Stricter Penalties
JONES DAY PRESENTS: The Challenges of Defending Trade Secrets in China
This is the final article of a three-article series about the challenges the American federal government faces in its efforts to ban TikTok. The first article set up the legal and political posture of attempts to ban TikTok...more
Fanxiao Domain Spoofing Campaign Accrues Network of Over 42,000 Malicious and Redirect Websites - Researchers from Cyjax have published a report on how a financially motivated threat group known as "Fangxiao" is conducting...more
Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more
Ransomware/Malware Activity - Twitter Confirms Data Breach Affecting 5.4 Million Account Profiles - On August 5, 2022, Twitter confirmed it has suffered a data breach after receiving a report of a vulnerability through...more
Spyware Vendor RCS Labs Observed Infecting Android and iOS users with Commercial Surveillance Tools - Google's Threat Analysis Group (TAG) published a report regarding RCS Labs' activity involving infecting Android and iOS...more
Selected Developments in U.S. Law - SEC Proposed Rule Will Require Private Funds to Report Certain Cyber Events On January 26, 2022, the U.S. Securities and Exchange Commission (SEC) proposed new rules to enhance hedge fund...more
Report on Research Compliance 18, no. 9 (September, 2021) - A former Harvard Medical School and Massachusetts General Hospital (MGH) researcher who was the principal investigator on a 2014 NIH award of $939,495.27 and...more
Report on Supply Chain Compliance 3, no. 18 (September 17, 2020) - In June of 2020, Trustwave SpiderLabs, a cybersecurity firm, announced it had found malware on tax software downloaded by a client. The malware was embedded...more
Last week, authorities from the United States, United Kingdom and Canada accused a well-known hacker group tied to the Russian government, APT29 a/k/a Cozy Bear of using malware to exploit security vulnerabilities to enable...more
As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more
On March 11, the Word Health Organization officially characterized the coronavirus (COVID-19) outbreak as a pandemic. During the outbreak, many employers around the world are seeking to prioritize the well-being and safety of...more
What do tornadoes, hurricanes, earthquakes, wildfires, and the coronavirus have in common? Scams. Disasters seem to beget scammers well versed in both price gouging and knockoff peddling, as well as phishing schemes and...more
The novel coronavirus outbreak is creating electronic communication and data privacy concerns on a number of fronts. One immediate effect is a significant increase in phishing scams, used by threat actors to launch malware...more
The coronavirus—or COVID-19—has health care experts scrambling, and has caused global concern for health and well-being due to its rapid spread throughout many countries, including the United States....more
Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more
Concern over the spreading coronavirus from China is legitimate and real. The World Health Organization (WHO) has declared the coronavirus a global health emergency, and the United States and other countries are limiting...more
This is the third alert in our series on the risks to corporations, including financial services firms, posed by “deepfakes”—a type of technology, powered by artificial intelligence and machine learning, that can be used to...more
Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more
Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar....more
Community Health System, located in Tennessee, has agreed to settle claims made against it arising from a 2014 data breach for $4.5 million. ...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the European Data Protection Board's published opinions on data protection impact assessments, an Ohio court's ruling that bitcoin is covered insured...more
Today’s Muskdate is all about the SEC issuing a subpoena to Tesla as it continues its investigation into Elon’s August 7 Twitter post about the “funding secured” detail of his plans to take the company private....more
In This Issue - Ransomware Advisory - The WannaCry ransomware attack that began on May 12 infected 230,000 computers in more than 150 countries within a few days. The scope of the attack was unprecedented—which is just one...more
In what New York’s top federal prosecutor called a “wake-up call for law firms around the world,” three Chinese citizens have been charged with hacking into the servers of two prominent – but unidentified – international law...more
In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more