Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/51/2b/97/512b9730-9bdd-80d7-4399-6131aec152e2/mza_2079604229688464795.jpg/600x600bb.jpg
China Hack Report: Daily US Tech Defense
Inception Point Ai
184 episodes
22 hours ago
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
RSS
All content for China Hack Report: Daily US Tech Defense is the property of Inception Point Ai and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/1049f51c9c64e3e9034ee632af92ea43.jpg
China Hacks Rampage: React2Shell & BRICKSTORM Chaos, US Nukes Probed, VMware Backdoored, Sanctions Fly!
China Hack Report: Daily US Tech Defense
3 minutes
1 month ago
China Hacks Rampage: React2Shell & BRICKSTORM Chaos, US Nukes Probed, VMware Backdoored, Sanctions Fly!
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks hitting US tech defenses. Buckle up, because the last 24 hours as of December 13 have been a whirlwind of urgent patches and fresh alerts—let's dive straight into the chaos.

Picture this: I'm sipping my late-night baijiu-laced coffee when CISA drops the hammer on React2Shell, that nasty CVE-2025-55182 with a perfect CVSS 10.0 score. Just yesterday, December 12, they revised the federal patch deadline to immediate action, no more lollygagging till December 26. Why? Chinese hackers—yeah, those state-sponsored crews with ties to the PRC—pounced on this React Server Components flaw hours after disclosure on December 5. Wiz reports opportunistic waves slamming Next.js apps in Kubernetes clouds, probing Taiwan, Uyghur regions, Vietnam, Japan, New Zealand hardest, but don't sleep on US hits: .gov sites, academic labs, even a uranium import authority got selective love. Palo Alto's Unit 42 confirms exploitation for remote code execution via unsafe deserialization. CISA's screaming: patch to React 19.0.1, 19.1.2, or 19.2.1 now, scan for indicators, segment networks, and report incidents stat.

But wait, there's more heat from BRICKSTORM, the stealthy backdoor CISA and Canada's Cyber Centre unpacked on December 4. WARP PANDA, that slick China-nexus squad with cloud wizardry, deploys it on Windows and VMware vCenter/ESXi for eternal persistence in IT and government sectors. It masquerades in legit traffic, yoinks files, self-heals if disrupted—CrowdStrike's on it, linking to US entity breaches since April 2024. Madhu Gottumukkala, CISA's Acting Director, nailed it: these actors embed for sabotage. Immediate moves? Hunt IOCs, inventory edge devices, enforce Cross-Sector Cybersecurity Performance Goals, and isolate if found.

Sectors under fire: critical infrastructure like energy and gov tech, with React2Shell eyeing nuclear ops. No brand-new malware in the last day, but BRICKSTORM's echoes linger, and UK's December 9 sanctions on i-Soon and Integrity Tech for reckless US/UK hits underscore the pattern—China's embassy called it "pot calling kettle black," but we're not buying.

Defensive playbook from CISA: patch React2Shell yesterday, audit VMware for BRICKSTORM, enable EDR, segment like your data's life depends on it—because it does. Huntress warns of Gladinet hard-coded keys from December 11 bleeding into this, opening RCE doors on nine orgs already.

Folks, stay vigilant—China's cyber game is OPSEC-tight and relentless. Thank you for tuning in, and hit subscribe for daily drops. This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
China Hack Report: Daily US Tech Defense
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs