Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
History
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/51/2b/97/512b9730-9bdd-80d7-4399-6131aec152e2/mza_2079604229688464795.jpg/600x600bb.jpg
China Hack Report: Daily US Tech Defense
Inception Point Ai
181 episodes
1 day ago
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
RSS
All content for China Hack Report: Daily US Tech Defense is the property of Inception Point Ai and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/1049f51c9c64e3e9034ee632af92ea43.jpg
China's Cyber Ninjas Flexing Hard: VMware, Telecoms in Crosshairs as 2025 Winds Down
China Hack Report: Daily US Tech Defense
3 minutes
3 weeks ago
China's Cyber Ninjas Flexing Hard: VMware, Telecoms in Crosshairs as 2025 Winds Down
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks hitting US tech defenses. Picture this: it's December 15, 2025, and the last 24 hours have been a fireworks show of Beijing's digital ninjas probing our grids. Google's Threat Intelligence Group just dropped a bombshell over the weekend, linking five fresh China-nexus crews—UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595—to exploiting the React2Shell zero-day, CVE-2025-55182. These bad boys are slamming virtualized setups like VMware vSphere, dropping payloads like MINOCAT tunneling tools, SNOWLIGHT downloaders, COMPOOD backdoors, upgraded HISONIC, and even ANGRYREBEL.LINUX RATs. Sectors? Think government IT, telecoms, legal services, software providers—basically anything juicy for espionage or sabotage.

Hot on that, CISA and NSA, alongside Canada's Cyber Centre, sounded alarms on December 4 about Brickstorm malware, but echoes are rippling today. Chinese-linked ops are embedding in US and global telecoms for long-term disruption, per CISA's acting director Madhu Gottumukkala. They burrow via backdoors, snag creds, and own machines—think Salt Typhoon still lurking in comms networks, exploiting old CVEs for mass spying across dozens of countries, as detailed in today's Federal Register.

No emergency patches screamed in the last day exactly, but Broadcom's urging VMware vSphere users to slap on the latest updates against Brickstorm, and Shadowserver's scanning 116,000 vulnerable IPs, over 80,000 in the US. GreyNoise clocked 670 exploit attempts in the past day alone, IPs pinging from China, US, India—you name it. CISA's Known Exploited Vulnerabilities catalog just added CVE-2025-14174, a Google Chrome macOS memory smash fixed in version 143.0.7499.110, reported by Apple's SEAR and Google TAG on December 5.

Defensive playbook from CISA? Hunt those indicators—patch React2Shell yesterday, segment networks, hunt for FRP-based tunnels like MINOCAT, and kill unsecured VNCs that pro-Russia crews are also loving. Ditch Chinese-owned smart home gear like Haier-controlled GE Appliances; their U+ Connect platform funnels data to Beijing under 2017 laws, ripe for grid-surging hacks on fridges and heaters, warns DC Journal's Jon Toomey.

Meanwhile, China's tweaking its Cybersecurity Law effective January 1, 2026, with extraterritorial teeth to chase overseas threats and AI boosts—classic misdirection while their hackers feast. Check Point's December 15 report flags global attack spikes, education in the crosshairs as holidays hit.

Stay sharp, listeners—update, isolate, and audit those supply chains. This has been Ting signing off. Thanks for tuning in—subscribe for daily drops! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
China Hack Report: Daily US Tech Defense
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs