Foreign Ownership, Control, or Influence (FOCI) refers to a situation where a foreign entity has the power to directly or indirectly influence the management or operations of a company. FOCI can result from legal means like...more
As companies embrace digital transformation, they increasingly depend on proprietary technologies and data that requires robust cybersecurity measures to safeguard intellectual property (IP). Zifino and Foley & Lardner LLP...more
On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more
On February 28, 2024, President Biden signed Executive Order (EO) 14117 titled “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” On March 5,...more
Topic Links Maritime trade is essential to America's economic viability and national security interests. The U.S. Marine Transportation System (MTS) – comprising an intricate system of ports, terminals, vessels, waterways and...more
In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent...more
PayPal Discloses December 2022 Security Incident Involving Credential Stuffing Attacks - PayPal has begun sending out notification letters to individuals impacted by a security incident that occurred in early December...more
New SEO Poisoning Campaign Utilizing "Gootkit" Malware Loader Targets the Australian Healthcare Sector - The operators of the "Gootkit" malware loader (otherwise known as "Gootloader") have started a new search engine...more
Health and Human Services Organization Discloses Ransomware Attack and Breach from Early 2022 - On January 5, 2023, Maternal & Family Health Services (MFHS) disclosed that a ransomware attack occurred on April 4, 2022, and...more
Royal Ransomware Operation No Longer Residing in the Shadows - "Royal", a ransomware operation consisting of "a group of vetted and experienced ransomware actors from previous operations" and first discovered in January of...more
"EvilProxy" Provides Low-Skill Threat Actors Access to Advanced Phishing Techniques - A new Phishing-as-a-Service (PaaS) platform dubbed "EvilProxy" has been discovered by Resecurity researchers. PaaS platforms allow...more
Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more
The Ankura Cyber Threat Investigations & Expert Services (CTIX) team conducted a technical analysis of historical and ongoing adversarial activity associated with the current Ukrainian/Russian conflict. In doing so, the CTIX...more
EU and British authorities unveiled new proposals this week to “crimp the power of ‘gatekeeper’ platforms like Amazon, Apple, Facebook, Google and Microsoft, which policymakers argue deserve more oversight given their outsize...more
In Washington: While we have seen some hopeful progress this week on coronavirus relief, some cracks are beginning to show. Senate Majority Leader Mitch McConnell (R-KY) took to the Senate floor Thursday, signaling an...more
Cybersecurity does not just pose technical challenges; companies must always keep their eye on the human component of cyber risk. For example, even the most damaging and sophisticated hacks – such as the recent Twitter hacks...more
On May 21, the Federal Bureau of Investigation’s (FBI’s) Cyber Division released an FBI Flash warning recipients that nation-state cyber actors are targeting domestic universities, research institutes and private companies...more
Earlier this month, a New York jury failed to reach a verdict on whether a former CIA employee leaked government hacking tools to WikiLeaks. The jurors told the court they were “extremely deadlocked.” The jury did, however,...more
On February 10, 2020, Attorney General William Barr announced the indictment of four members of the Chinese military on charges of hacking into Equifax’s computer networks, maintaining unauthorized access to those networks...more
Trade Secrets Watch has been covering the escalating economic tension between China and the U.S., including the U.S. Trade Representative’s investigation on China’s alleged IP theft under Section 301 of the Trade Act of 1974,...more
For data security buffs like me, the recent McAfee® Labs Threats Report, December 2018 is, or should be, a top pick on the list. Well maybe not for the holiday reading list, and we need to be careful not to bring up the...more
“Chinese cyber espionage and cyber-attack capabilities will continue to support China’s national security and economic priorities,” as stated by Dan Coats, the Director of National Intelligence “Americans should not buy...more
In January of this year, Chinese wind turbine manufacturer Sinovel Wind Group Co. Ltd. was convicted of stealing trade secrets from U.S. company AMSC Inc. ...more
The latest report regarding Russia stealing U.S. cyber secrets is yet again centered around the National Security Agency (NSA), using Contractors to gain access, in some cases, to classified data....more
The sorry story of Chris Correa, the St. Louis Cardinal executive convicted of hacking into the Houston Astros computer system expanded last month when Federal Judge Lynn Hughes unsealed details about the extent of the...more