{"id":2558,"date":"2025-04-01T08:06:25","date_gmt":"2025-04-01T08:06:25","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2558"},"modified":"2025-04-01T08:06:25","modified_gmt":"2025-04-01T08:06:25","slug":"after-fake-employees-fake-enterprises-are-next-hiring-threat-to-corporate-data","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2558","title":{"rendered":"After fake employees, fake enterprises are next hiring threat to corporate data"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Chinese companies are trying to cut Taiwan\u2019s lead in semiconductor technology by hiring away its best engineering talent through \u2018front\u2019 companies that hide their connections to China, the Taiwanese Ministry of Justice Investigation Bureau (MJIB) has alleged.<\/p>\n<p>In a dramatic crackdown on the practice last week, MJIB said its agents raided 11 Chinese companies in 34 locations, questioning 90 individuals in connection with what it described as an \u201cillegal poaching\u201d campaign.<\/p>\n<p>According to an\u00a0<a href=\"https:\/\/www.mjib.gov.tw\/news\/Details\/28\/1082\">MJIB statement<\/a>, several Chinese companies had set up companies that looked as if they were Taiwanese, foreign-owned, or overseas Chinese, using tactics designed to hide their connections to the mainland.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Chinese companies are trying to cut Taiwan\u2019s lead in semiconductor technology by hiring away its best engineering talent through \u2018front\u2019 companies that hide their connections to China, the Taiwanese Ministry of Justice Investigation Bureau (MJIB) has alleged. In a dramatic crackdown on the practice last week, MJIB said its agents raided 11 Chinese companies in [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2559,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2558"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2558"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2559"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}