logo
LVMH's Loro Piana put under court administration in Italy over labour exploitation

LVMH's Loro Piana put under court administration in Italy over labour exploitation

Straits Times14-07-2025
Find out what's new on ST website and app.
This is the second time one of the luxury group's businesses has been taken to court over labour issues.
MILAN - An Italian court on July 14 placed under judicial administration LVMH's high-end Italian cashmere firm Loro Piana for indirectly subcontracting its production to Chinese-owned firms accused of exploiting workers, the latest brand to be embroiled in investigations into labour malpractice inside the Italian luxury supply chain.
The court in Milan ordered a one-year administration for Loro Piana Spa, according to a 26-page ruling reviewed by Reuters, in the latest in a string of cases that have tainted the image of Italy's luxury brands.
The administration will be lifted earlier if the company brings its practices into line with legal requirements.
The court said Loro Piana Spa 'culpably failed' to adequately oversee its suppliers in order to pursue higher profits.
Loro Piana could not immediately be reached for comment.
LVMH, the world's biggest luxury group, acquired 80 per cent of Loro Piana in July 2013, leaving 20 per cent in the hands of the Italian family that founded the company.
Loro Piana is the fifth fashion company to be targeted by the same Milan court over similar labour issues since December 2023, following Italian fashion group Valentino,
an Italian unit of LVMH's Dior , Italy's Armani, and Alviero Martini, an Italian handbag company.
Top stories
Swipe. Select. Stay informed.
Singapore Singapore to train more aviation and maritime officials from around the world
Singapore Special edition SG60 Nets card now on sale for $10
Singapore 18 years' jail for woman who hacked adoptive father to death after tussle over Sengkang flat
Business Singapore's economy sees surprise expansion in Q2 despite US tariff uncertainty: Advance estimate
Singapore Jail, caning for man who had 285 child porn videos, including those showing infants
Singapore Jail for woman who opened bank accounts that received over $640.7m, including scam proceeds
Singapore Driver assisting with police probe after e-bike rider injured in hit-and-run in Hougang
Sport After Olympic heartbreak, Singaporean swimmer Chantal Liew turns pain into inspiration
The Milan court lifted the judicial administration it placed on Dior, Armani and Alviero Martini before the end of the one-year deadline imposed on them. The order against Valentino, on the other hand, is much more recent, dating back to May. REUTERS
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Indian firm says it shipped non-military explosives to Russia
Indian firm says it shipped non-military explosives to Russia

Straits Times

time3 hours ago

  • Straits Times

Indian firm says it shipped non-military explosives to Russia

NEW DELHI - An Indian firm that shipped $1.4 million worth of an explosive compound with military uses to Russia in December said on Saturday it complies with Indian rules and the substance it had shipped was for civilian industrial purposes. Reuters reported on July 24 that Ideal Detonators Private Limited shipped the compound, known as HMX or octogen, to two Russian explosives manufacturers despite U.S. threats to impose sanctions on any entity supporting Russia's Ukraine war effort. One of the Russian companies listed in Indian customs data as receiving the compound is the explosives manufacturer Promsintez. An official at Ukraine's SBU security service has said the Russian company has ties to the military and that Ukraine launched a drone attack in April against a Promsintez-owned factory. Promsintez did not respond to a request for comment. Ideal Detonators said in an emailed response to Reuters that the material it shipped was not military grade. "The shipment ... is for industrial activity and it's a civil explosive," the company said. The U.S. government has identified HMX as "critical for Russia's war effort" and has warned financial institutions against facilitating any sales of the substance to Moscow. The U.S. Treasury Department has the authority to sanction those who sell HMX and similar substances to Russia, sanctions lawyers have said. Top stories Swipe. Select. Stay informed. Singapore Woman taken to hospital after car falls into sinkhole on Tanjong Katong Road Singapore Students hide vapes in underwear, toilet roll holders: S'pore schools grapple with vaping scourge Singapore 'I've tried everything': Mum helpless as son's Kpod addiction spirals out of control Singapore NDP 2025: How Benjamin Kheng is whisked from Marina Bay to Padang in 10 minutes by boat, buggy Singapore Almost half of planned 30,000 HDB flats in Tengah to be completed by end-2025: Chee Hong Tat Singapore From libraries to living rooms: How reading habits take root in underserved S'pore children Asia Thai-Cambodia clashes spread along frontier as death toll rises Asia Thousands rally in downtown Kuala Lumpur for resignation of PM Anwar HMX is widely used in missile and torpedo warheads, rocket motors, exploding projectiles and plastic-bonded explosives for advanced military systems, according to the Pentagon's Defense Technical Information Center and related defense research programs. The compound also has some limited civilian applications in mining and other industrial activities. REUTERS

Chinese academic in Australia slams 'ridiculous' Hong Kong bounties
Chinese academic in Australia slams 'ridiculous' Hong Kong bounties

Straits Times

time7 hours ago

  • Straits Times

Chinese academic in Australia slams 'ridiculous' Hong Kong bounties

Find out what's new on ST website and app. The bounties issued by Hong Kong range from about US$25,000 (S$32,000) to US$125,000, depending on the individual. Sydney - An academic in Australia who was among 19 people that Hong Kong issued bounties for has criticised the 'ridiculous' arrest warrants and warned that the region was trying to exert its power beyond its borders. Authorities from the Chinese city announced cash rewards on July 25 for information leading to the arrest of 19 overseas activists involved in Hong Kong Parliament – a pro-democracy group established in Canada. The bounties range from about US$25,000 (S$32,000) to US$125,000, depending on the individual. Among those named was Prof Feng Chongyi, a China studies professor at the University of Technology Sydney. 'It's certainly ridiculous,' he told the Sydney Morning Herald in an interview published July 26. 'They've got the power, they've got the influence overseas, they want to control everything even overseas.' Prof Feng told the publication he joined the group as an academic. Top stories Swipe. Select. Stay informed. Singapore Almost half of planned 30,000 HDB flats in Tengah to be completed by end-2025: Chee Hong Tat Asia Death toll climbs as Thai-Cambodia clashes continue despite calls for ceasefire Multimedia Lights dimmed at South-east Asia's scam hub but 'pig butchering' continues Singapore Black belt in taekwondo, Grade 8 in piano: S'pore teen excels despite condition that limits movements Asia Where's Jho Low? Looking for 1MDB fugitive at a Shanghai luxury estate Asia Thousands rally in downtown Kuala Lumpur calling for the resignation of PM Anwar Life SG60 F&B icons: Honouring 14 heritage brands that have never lost their charm Business Can STI continue its defiant climb in second half of 2025? 'I feel very sad, I'm extremely upset that the autonomous Hong Kong has been destroyed,' he added. 'It's unbearable for me.' 'Hong Kong was such a beautiful, dynamic place – the best part of Chinese culture, the combination of the East and the West.' The former British colony – handed back to China in 1997 – has seen political dissent quashed since Beijing imposed a sweeping national security law in 2020 following huge and at times violent pro-democracy protests. Prof Feng, who has conducted research into China's pro-democracy groups, was detained for a week in China in 2017. At the time, his lawyer said he was 'suspected of harming national security and could not leave China'. The July 25 announcement of bounties was the fourth from Hong Kong authorities, which has previously drawn strong criticism from Western countries. The bounties are seen as largely symbolic given that they affect people living abroad in nations unlikely to extradite political activists to Hong Kong or China. Australian Foreign Minister Penny Wong said on July 26 she strongly objected to the arrest warrants. 'Freedom of expression and assembly are essential to our democracy,' she said on social media platform X. 'We have consistently expressed our strong objections to China and Hong Kong on the broad and extraterritorial application of Hong Kong's national security legislation, and we will continue to do so.' The UK also condemned the move as 'another example of transnational repression', according to a statement from British Foreign Secretary David Lammy and Home Secretary Yvette Cooper. The Hong Kong government hit back on July 26, calling Britain's reaction 'untrue and biased'. 'Those absconders hiding in the UK and other Western countries are wanted because they continue to blatantly engage in activities endangering national security,' it said, demanding that Britain 'stop interfering in Hong Kong matters which are purely China's internal affairs'. AFP

Microsoft probing whether cyber alert tipped off Chinese hackers
Microsoft probing whether cyber alert tipped off Chinese hackers

Straits Times

time8 hours ago

  • Straits Times

Microsoft probing whether cyber alert tipped off Chinese hackers

Find out what's new on ST website and app. Microsoft is looking into whether a leak from its early alert system led to the widespread exploitation of vulnerabilities in the SharePoint software. Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in its SharePoint service before they were patched, according to people familiar with the matter. The technology company is looking into whether the programme – designed to give cybersecurity experts a chance to fix computer systems before the revelation of new security concerns – led to the widespread exploitation of vulnerabilities in its SharePoint software globally over the past several days, the people said, asking not to be identified discussing private matters. 'As part of our standard process, we'll review this incident, find areas to improve, and apply those improvements broadly,' a Microsoft spokesperson said in a statement, adding that partner programmes are an important part of the company's security response. The Chinese embassy in Washington referred to comments made by foreign affairs ministry spokesman Guo Jiakun to media earlier this week, opposing hacking activities. 'Cybersecurity is a common challenge faced by all countries and should be addressed jointly through dialogue and cooperation,'' Mr Guo said. 'China opposes and fights hacking activities in accordance with the law. At the same time, we oppose smears and attacks against China under the excuse of cybersecurity issues.' Microsoft has attributed SharePoint breaches to state-sponsored hackers from China , and at least a dozen Chinese companies participate in the initiative, called the Microsoft Active Protections Program, or MAPP, according to Microsoft's website. Members of the 17-year-old programme must prove they are cybersecurity vendors and that they don't produce hacking tools like penetration testing software. After signing a non-disclosure agreement, they receive information about novel patches to vulnerabilities 24 hours before Microsoft releases them to the public. A subset of more highly-vetted users receive notifications of an incoming patch five days earlier, according to Microsoft's MAPP website. Mr Dustin Childs, head of threat awareness for the Zero Day Initiative at cybersecurity company Trend Micro, says Microsoft alerted members of the program about the vulnerabilities that led to the SharePoint attacks. 'These two bugs were included in the MAPP release,' says Mr Childs, whose company is a MAPP member. 'The possibility of a leak has certainly crossed our minds.' He adds that such a leak would be a dire threat to the program, 'even though I still think MAPP has a lot of value'. Victims of the attacks now total more than 400 government agencies and corporations worldwide, including the US's National Nuclear Security Administration, the division responsible for designing and maintaining the country's nuclear weapons. For at least some of the attacks, Microsoft has blamed Linen Typhoon and Violet Typhoon, groups sponsored by the Chinese government, as well as another China-based group it calls Storm-2603. In response to the allegations, the Chinese Embassy has said it opposes all forms of cyberattacks, while also objecting to 'smearing others without solid evidence'. Mr Dinh Ho Anh Khoa, a researcher who works for the Vietnamese cybersecurity firm Viettel, revealed that SharePoint had unknown vulnerabilities in May at Pwn2Own, a conference in Berlin run by Mr Childs' organisation where hackers sit on stage and search for critical security vulnerabilities in front of a live audience. After the public demonstration and celebration, Mr Khoa headed to a private room with Childs and a Microsoft representative, Mr Childs said. Mr Khoa explained the exploit in detail and handed over a full white paper. Microsoft validated the research and immediately began working on a fix. Mr Khoa won US$100,000 (S$128,160) for the work. It took Microsoft about 60 days to come up with a fix. On July 7, the day before it released a patch publicly, hackers attacked SharePoint servers, cybersecurity researchers said. It is possible that hackers found the bugs independently and began exploiting them on the same day that Microsoft shared them with MAPP members, says Mr Childs. But he adds that this would be an incredible coincidence. The other obvious possibility is that someone shared the information with the attackers. The leak of news of a pending patch would be a substantial security failure, but 'it has happened before,' says Mr Jim Walter, senior threat researcher the cyber firm SentinelOne. MAPP has been the source of alleged leaks as far back as 2012, when Microsoft accused the Hangzhou DPtech Technologies, a Chinese network security company, of disclosing information that exposed a major vulnerability in Windows. Hangzhou DPtech was removed from the MAPP group. At the time, a Microsoft representative said in a statement that it had also 'strengthened existing controls and took actions to better protect our information'. In 2021, Microsoft suspected at least two other Chinese MAPP partners of leaking information about vulnerabilities in its Exchange servers, leading to a global hacking campaign that Microsoft blamed on a Chinese espionage group called Hafnium. It was one of the company's worst breaches ever – tens of thousands of exchange servers were hacked, including at the European Banking Authority and the Norwegian Parliament. Following the 2021 incident, the company considered revising the MAPP program, Bloomberg previously reported. But it did not disclose whether any changes were ultimately made or whether any leaks were discovered. A 2021 Chinese law mandates that any company or security researcher who identifies a security vulnerability must report it within 48 hours to the government's Ministry of Industry and Information Technology, according to an Atlantic Council report. Some of the Chinese companies that remain involved in MAPP, such as Beijing CyberKunlun Technology, are also members of a Chinese government vulnerabilities programme, the China National Vulnerability Database, which is operated by the country's Ministry of State Security, according to Chinese government websites. Mr Eugenio Benincasa, a researcher at ETH Zurich's Center for Security Studies, says there is a lack of transparency about how Chinese companies balance their commitments to safeguard vulnerabilities shared by Microsoft with requirements that they share information with the Chinese government. 'We know that some of these companies collaborate with state security agencies and that the vulnerability management system is highly centralised,' says Mr Benincasa. 'This is definitely an area that warrants closer scrutiny.' BLOOMBERG

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store