Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Technology
History
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/da/75/3a/da753a71-ca35-b705-083c-04a4dd37605e/mza_7008510780420122552.jpg/600x600bb.jpg
US-China CyberPulse: Defense Updates
Inception Point Ai
183 episodes
2 days ago
This is your US-China CyberPulse: Defense Updates podcast.

Stay informed with "US-China CyberPulse: Defense Updates," your go-to podcast for weekly insights into America's cybersecurity landscape in response to Chinese threats. Explore the latest defensive strategies, government policies, and private sector initiatives aimed at enhancing national security. Delve into international cooperation efforts and discover emerging protection technologies shaping the future. Tune in for expert analysis and stay ahead in the ever-evolving world of cybersecurity.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
RSS
All content for US-China CyberPulse: Defense Updates is the property of Inception Point Ai and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This is your US-China CyberPulse: Defense Updates podcast.

Stay informed with "US-China CyberPulse: Defense Updates," your go-to podcast for weekly insights into America's cybersecurity landscape in response to Chinese threats. Explore the latest defensive strategies, government policies, and private sector initiatives aimed at enhancing national security. Delve into international cooperation efforts and discover emerging protection technologies shaping the future. Tune in for expert analysis and stay ahead in the ever-evolving world of cybersecurity.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
Episodes (20/183)
US-China CyberPulse: Defense Updates
US Slams Door on China Tech as CyberPulse Fires Up | BRICKSTORM and MongoBleed Lurk | NIST Drops AI Security Heat
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks and digital showdowns. Picture this: it's the final countdown to 2026, and the US-China CyberPulse is firing on all cylinders with fresh defenses against Beijing's sneaky probes. Kicking off with a blockbuster—President Trump just inked a $900 billion defense bill that slams the door on China-based engineers accessing Pentagon cloud systems. ProPublica exposed how Microsoft had these whiz kids from the mainland servicing DoD gear for a decade, with so-called "digital escorts" from the US who couldn't keep up. Defense Secretary Pete Hegseth blasted it on X, saying foreign engineers, especially from China, should never touch DoD systems. Rep. Elise Stefanik called it closing contractor loopholes exploited by Big Tech, while Sen. Tom Cotton hailed it as shielding critical infrastructure from Communist China threats. The law bans access from China, Russia, Iran, and North Korea, codifying Hegseth's September contractor rules, and mandates briefings to Congress starting June 1, 2026. Microsoft's already pledged to tweak protocols, but the Pentagon's probing if any data got swiped.

Shifting gears to threats in the wild—CISA dropped an update on BRICKSTORM, that slick backdoor from PRC state-sponsored crews targeting VMware vSphere and Windows in critical infrastructure like water utilities. WaterISAC warns it's built for long-term lurking, with stealth comms, lateral movement, and auto-reinstalls. Patch now, folks, or watch your networks get tunneled.

Then there's MongoBleed, CVE-2025-14847, a nasty memory-leaker hitting unpatched MongoDB servers with zlib compression—US, China, and EU topside for exploits. CISA slapped it on the Known Exploited Vulnerabilities catalog, giving feds till January 19 to fix. Resecurity's telemetry shows cloud misconfigs galore; attackers are scanning internet-wide for easy wins.

Private sector's stepping up too—NIST unleashed a preliminary Cybersecurity Framework Profile for AI on December 16, layering Secure, Detect, and Thwart focus areas on CSF 2.0. Think AI-specific risks like deepfake phishing, unique creds for AI systems, and resilience against adversarial AI. High-priority tweaks for governance, inventories of AI models and APIs, and incident response with AI-driven analytics.

No big international collabs popped this week, but these moves scream unilateral hardening. China's tweaking its own Cybersecurity Law for AI focus, but that's their sandbox.

Whew, the pulse is strong—stay vigilant, patch those MongoDBs, and audit your vendors. Thanks for tuning in, listeners—subscribe for more cyber scoops! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
2 days ago
3 minutes

US-China CyberPulse: Defense Updates
Cyber Sleuth Ting: US-China Hacks, Blacklists & AI Clampdowns - Tensions Simmer in Digital Cold War Drama!
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks and digital drama. Buckle up, because this week's US-China CyberPulse has been a non-stop thriller—Salt Typhoon hackers still lurking in US telecoms like ghosts in the wires, while the Pentagon drops the hammer on 134 China-linked firms, blacklisting them from defense deals by mid-2026. Picture this: I'm hunkered down in my San Francisco war room, screens flickering with CISA alerts, as FBI bosses reveal Chinese state-sponsored creeps infiltrated nine major US carriers, plus energy and water grids built before firewalls were a thing. That's Salt Typhoon for you—up to two years of undetected access across 200 orgs in 80 countries, spiking cyber-espionage 150% year-over-year.

But America's not sleeping. The DoD's rolling out phased bans under the 2024 NDAA Section 805, cutting off new contracts with these entities and even indirect buys of their end products by 2027—no components spared in the supply chain purge. They're using supply chain illumination data to sniff out risks, pushing contractors toward US and allied suppliers. Witty move, right? It's like telling your shady ex to stay off your phone—total block. Meanwhile, Coast Guard's gone full AI cop, mandating inventories of every AI tool since March, steering clear of sketchy commercial gen-AI and locking down data with approved feds-only systems.

On the tech front, a MongoDB bomb—CVE-2025-14847—lets unauth attackers leak data from 87,000 exposed servers, 42% in clouds, with hotspots in the US and China. Attackers spam malformed packets to slurp heap memory; Wiz researchers Merav Bar and Amitai Cohen nailed the zlib decompression flaw. US firms like Actelis Networks are hustling to modernize aging infra against these hits—critical, since 70% of 2024 attacks targeted pipelines and power plants.

China's counterpunching with flair: Cyberspace Administration's draft rules clamp AI chatbots from emotional manipulation—no suicide nudges or self-harm vibes, first global stab at "emotional safety" for human-like bots. Their 2025 arms control white paper preaches cyber sovereignty, pushing peace, transparency, and their rules for cyberspace governance. NPC's new Foreign Trade Law, effective March 2026, slaps IP sanctions on foreign IP thieves, with MOFCOM playing trade cop like our ITC.

Internationally? Tensions simmer—China eyes retaliation on US chip tariffs for 2027, while MIIT's 2026 manufacturing blueprint digitizes factories with industrial AI and data graphs, eyeing domestic chips over imports. US military's embedding AI operationally, Coast Guard-style, to outpace Beijing's digital surge.

Listeners, stay vigilant—the cyber Cold War's heating up, but with these defenses, we're scripting the win. Thanks for tuning in—subscribe for more pulse-pounding updates!

This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
4 days ago
3 minutes

US-China CyberPulse: Defense Updates
Silicon Smackdown: US Drops $1T Hammer on China's Shenzhen Chip Caper
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks and digital drama. Buckle up, because this week's US-China CyberPulse has been a fireworks show of defenses ramping up against Beijing's sneaky silicon sprint.

Picture this: I'm huddled in my Shenzhen-inspired war room—okay, it's my NYC apartment with dim sum delivery—watching reports explode from Techspective about China's "Silicon Manhattan Project." Yeah, that's their atomic-level push to crack ASML's Extreme Ultraviolet lithography tech in a secret Shenzhen lab, overseen by Xi's buddy Ding Xuexiang and Huawei heavyweights. They're poaching ex-ASML engineers with fat bonuses and fake IDs to build chips for killer AI models, dodging US sanctions like pros. Reuters and Taiwan News confirmed the prototype's spitting EUV light already. US response? The National Defense Authorization Act, per Eurasian Times, slams nearly $1 trillion into closing tech gaps—$2.6 billion for hypersonics, quantum computing, and cyber workforce boosts. They're mandating DoD cybersecurity harmony by June 2026, banning China-sourced molybdenum, gallium, and germanium, and even creating a US-Israel Defense Industrial Base Working Group to lock in Pax Silica alliances. Israel just picked Team USA over China, Jerusalem Post says, ditching the tightrope walk.

Meanwhile, CISA dropped Cybersecurity Performance Goals 2.0 on December 11th, Global Policy Watch reports, updating NIST CSF 2.0 with universal IT-OT goals tackling third-party risks and zero-trust to block lateral movement—perfect for thwarting Chinese TTPs. CISA's also warning with NSA and allies about BRICKSTORM malware from PRC state-sponsored crews targeting critical infrastructure. Chris Krebs on Face the Nation spilled the tea: Chinese hackers just pulled the first fully automated AI cyberattack using Claude to breach 30 orgs lightning-fast. Private sector? They're scrambling with self-governance since Biden's AI EO got yanked, but encrypted USB adoption's booming here versus China's digitalization rush.

Internationally, White House memo frees 7.125-7.4 GHz spectrum for 6G dominance, outpacing China's AI governance tweaks like Labeling Rules for "Core Socialist Values" content. And check the US-Palau pact blocking Chinese political warfare—classic block-and-build.

Whew, America's not just defending; we're sprinting with trillion-dollar muscle, alliances, and zero-trust shields. China's clever, but we're wiring the win.

Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
5 days ago
2 minutes

US-China CyberPulse: Defense Updates
Trump's Cyber Smackdown: Slamming Doors on China's Sneaky Bytes
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks and digital showdowns. Buckle up for this week's US-China CyberPulse—straight fire from the past few days leading into December 26, 2025. We're talking Uncle Sam's latest barricades against Beijing's sneaky bytes.

First off, President Trump's National Security Strategy, dropped December 5 but buzzing all week per JD Supra breakdowns, is a beast. It slams the door on China's tech creep by pushing US financing for resilient energy grids and cyber networks in Africa and the Americas—think hardened comms fortified with American encryption. No more chowing down on Huawei's cheap telecom bait. National Cyber Director Sean Cairncross is all in, hyping private sector intel-sharing for real-time threat hunting and attribution. The preview National Cybersecurity Strategy, eyed for January 2026, promises offensive cyber ops to smack back at nation-state punks, plus deregulation to juice innovation without red tape tangles.

Private sector's flexing hard too. The FCC just nuked new DJI and Autel drones from China—added to the Covered List, per Asia Tech Lens reports, blocking imports cold. No more foreign UAS components sneaking into US skies; it's all about onshoring that supply chain via the FY2025 NDAA and Trump's June Unleashing American Drone Dominance EO. Drone ops just got pricier for Uncle Sam, but hey, domestic makers like they're on steroids.

Government policies? Pentagon's fresh report on China's military, released this week via DefenseScoop, spills that Beijing's closing the AI gap—LLMs from Baidu and Alibaba now rival US models for PLA cyber ops, deepfakes, and Taiwan psyops. They're weaving military-civil fusion to snag commercial AI breakthroughs for unmanned systems and info warfare. US counter? Rolling out GenAI.mil with Google Cloud's Gemini and soon xAI's Grok at IL5 for secure CUI handling—Elon Musk's squad giving troops real-time X insights. Game-changer against PRC's "kill webs" and cognitive domain tricks.

Internationally, it's a techno-bloc party. Trump's NSS urges Europe to crush cyber espionage, while South Korea's Lee Jae Myung admin ramps espionage laws and investment screens against Chinese tech theft, per Korea on Point. Taiwan's hardening undersea cables and dropping AI regs to sync with EU vibes. Even Japan's active cyber defense pivot has China's Foreign Ministry's Lin Jian fuming—calling it a WWII aggressor remix.

Emerging tech? Defense evasion tricks from BlindEagle APT-C-36, per CYFIRMA's December 26 Weekly Intelligence Report—fileless chains abusing Discord for Colombian gov hits. Evasive Panda's DNS poisoning with MgBot backdoor targeted Turkey, India, China itself, says The Hacker News. US is countering with AI deception and harmonized regs.

Whew, Beijing's probing, but America's stacking defenses like a pro—strategies, policies, collabs, and bleeding-edge AI. Stay vigilant, listeners.

Thanks for tuning in—subscribe for more CyberPulse drops! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 week ago
3 minutes

US-China CyberPulse: Defense Updates
Congress Gets Tough on China's Cyber Sins: Pentagon Preps AI Defenses as Attacks Skyrocket
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your friendly neighborhood China-and-cyber nerd, coming in hot with this week’s US‑China CyberPulse.

Let’s start with Washington, because Congress has been treating Chinese cyber threats like a full‑time job. The new Fiscal Year 2026 National Defense Authorization Act, the NDAA, just signed by President Donald Trump, hard‑wires China into the US cyber playbook. According to analysis from law firm Crowell & Moring, the act forces mandatory notification for US investments in Chinese advanced tech like semiconductors, AI, and quantum, and even lets the government block those deals outright when they smell national‑security risk. That’s classic “follow the money” defense: starve the PLA’s digital war machine before the code is even written.

Inside the Pentagon, the NDAA reads like a to‑do list for cyber survival. It orders the Department of Defense to harmonize cybersecurity rules across the defense industrial base so contractors aren’t juggling 19 conflicting checklists, and it pushes the Cybersecurity Maturity Model Certification from “nice‑to‑have” to “comply or lose the contract.” Crowell & Moring also notes new directives for an AI/ML cybersecurity policy, AI sandbox testbeds, and NSA‑driven AI security guidance, all explicitly framed around threats from nation‑state adversaries like China stealing or poisoning US AI models.

On Capitol Hill, China is now basically a reserved keyword. The House recently passed the Strengthening Cyber Resilience Against State‑Sponsored Threats Act, highlighted by MeriTalk, which would create a China‑focused cyber task force inside the federal machinery. Meanwhile, US lawmakers just sent a letter to Defense Secretary Pete Hegseth, reported by the Times of India, pressing the Pentagon to blacklist 17 Chinese tech firms, including DeepSeek and Xiaomi, as “Chinese military‑linked” under the 1260H list. That’s not just trade policy; it’s about ripping out potentially compromised hardware and AI platforms from the US military’s digital bloodstream.

On the private‑sector front, US defense and cloud providers are quietly shifting from passive firewalls to active hunting. The Pentagon’s formal rollout of CMMC, covered by MeriTalk, forces thousands of US suppliers—from small tooling shops in Ohio to satellite firms in California—to implement continuous monitoring, zero‑trust architectures, and rigorous incident reporting if they want DOD dollars. That massively raises the cost of long‑dwell Chinese campaigns like the Salt Typhoon and BRICKSTORM operations that CISA and international partners warned about earlier this year.

Internationally, the play is teamwork. CISA’s joint advisories with allies on China‑linked malware families, and the NSA‑hosted AI Security Center’s guidance, described in NDAA commentary, are building a shared doctrine so the US, the UK, Japan, and others can spot the same Chinese TTPs—tactics, techniques, and procedures—in real time and push back in a coordinated way.

Overlay all this with what the Pentagon’s annual China report relayed from CrowdStrike: a 150 percent jump in China‑linked intrusions in a single year. That’s the background music for everything I just walked you through—more attacks, more AI in the kill chain, and a US response that’s finally starting to look like an ecosystem instead of a patchwork.

I’m Ting, thanks for tuning in, and don’t forget to subscribe so you don’t miss the next breach breakdown. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 week ago
3 minutes

US-China CyberPulse: Defense Updates
Cyber Bombshells: Taiwan-Israel Secrets, Chinese Hacks, and Congress's Chip Crackdown!
This is your US-China CyberPulse: Defense Updates podcast.

Hey everyone, Ting here, diving into what's been absolutely wild in the cyber trenches this past week. So strap in because the US-China cyber battlefield just got a whole lot more interesting.

Let's kick off with what Taiwan's deputy foreign minister was doing slipping quietly into Israel in early December. Nobody wanted to talk about it publicly, but this is huge for understanding where security cooperation is heading. Taiwan and Israel are building these discreet ties in cybersecurity and AI, and the genius part is how they're hiding in plain sight. We're talking dual-use tech where a cyber assessment becomes a national security upgrade or an AI model transforms into infrastructure protection tools. The US is basically green-lighting this under the radar because it keeps things from escalating with Beijing while still getting critical expertise flowing.

Now flip to the Hill where Representative Andrew Garbarino is sweating bullets about the Cybersecurity Information Sharing Act hitting a deadline on January 30th, 2026. This law lets companies and government share threat intel without getting sued, and it literally sunsetted at the end of September. Garbarino's racing to make it permanent because every single person meeting with him is panicking about it. The guy knows this cannot lapse again, and he's trying to shove it into must-pass bills just to keep the whole thing from collapsing.

Meanwhile, Chinese state-linked hackers are absolutely exploiting a critical zero-day flaw called CVE-2025-20393 in Cisco's Email Security Appliances, granting root access since November without patches. This is the kind of persistence that keeps CISA analysts up at night. These threat actors are executing what looks like pure espionage operations, and security experts are pointing out this aligns perfectly with leaked Chinese military documents about exploiting foreign vendors for cyber dominance.

Here's where it gets spicy though. Congress is literally pushing back against Trump administration moves to let Nvidia sell advanced H200 chips to China. Representative Brian Mast introduced the AI OVERWATCH Act requiring Congress get alerts before advanced semiconductor sales go to Beijing. Gregory Meeks proposed the RESTRICT Act to straight-up ban these exports. They're arguing that keeping China locked out of cutting-edge chips is essential to maintaining US AI leadership.

But wait, there's more. China just tightened its own cybersecurity laws effective January 1st, 2026, hiking penalties from one million yuan up to ten million yuan for critical infrastructure operators. That's roughly 1.4 million dollars. They're also expanding extraterritorial reach, meaning any overseas conduct endangering Chinese cybersecurity now falls under their jurisdiction. It's basically their way of showing they can play hardball too.

And senators Maggie Hassan and Gary Peters just sent letters December 18th targeting major construction firms about their use of Chinese-made DJI drones on sensitive infrastructure. They're arguing these create pathways for transferring national security information straight to Beijing.

Thanks so much for tuning in, listeners. Make sure to subscribe for more cyber intelligence breakdowns. This has been Quiet Please, for more check out quietplease dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 week ago
3 minutes

US-China CyberPulse: Defense Updates
Shadow Quirks Breach Cisco as US-China Tech War Heats Up! Lawmakers Swing Banhammer, AI Arms Race Explodes
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to gal for all things China cyber chaos and hacking hijinks. Buckle up, because this past week in the US-China CyberPulse has been a non-stop thrill ride of zero-days, blacklists, and AI arms races—straight out of a spy thriller, but with more firewalls.

Picture this: I'm sipping my baijiu-laced energy drink when Cisco Talos drops a bombshell. A China-nexus crew, let's call 'em the Shadow Quirks, has been exploiting a zero-day in Cisco Secure Email Gateway since late November. CVE-2025-20393 lets them plant backdoors and wipe logs on hundreds of exposed gateways worldwide—India, Thailand, US systems lighting up like a bad pachinko machine. Shadowserver Foundation's Peter Kijewski says it's targeted, not mass chaos, but Cisco's yelling "rebuild everything!" No patch yet, just full nukes. Classic Beijing playbook: sneaky, persistent, and loving those Spam Quarantine features.

Meanwhile, over in DC, lawmakers are swinging the banhammer. Republicans want Xiaomi and DeepSeek slapped onto the Pentagon's list of China military-linked firms, joining Tencent and CATL. South China Morning Post reports this as part of the endless tech war tango. Trump's already signed a defense bill curbing investments in Chinese biotech and dual-use tech—outbound cash to PLA pals? Hard no. And get this: Nvidia's H200 AI chips are under inter-agency review for China sales, Commerce, State, Energy, Defense all piling on. Elon Musk even chimed in on X, agreeing with Adam Kobeissi that America's stagnant 1.3 terawatt grid is a "major competitive disadvantage" against China's 3.75 terawatts fueling their AI beast.

Private sector's not sleeping. US gov's pushing to privatize cyber ops, enlisting firms for offensive hacks against China-style espionage-crime mashups, per Security Conversations podcast with Juan Andres Guerrero-Saade and crew. Amazon caught a North Korean infiltrator via 110ms keystroke lag—hilarious, right? Too slow for Seattle. And ESET spotted LongNosedGoblin, a fresh China APT using Windows Group Policy for Southeast Asia gov surveillance.

Defensive strategies? Trump's halted retail CBDC to shield the dollar, while China's e-CNY hit $986B but lost $2B to DPRK hackers—prompting Beijing's beefed-up Cybersecurity Law penalties and AI fraud detectors. International angle: new US security strategy dials back China hostility, SCMP editorials note, but lawmakers still eye TikTok's algo spin-off warily.

Emerging tech-wise, privacy regs are exploding—EU GDPR fined TikTok €530M for China data dumps, Texas AG Ken Paxton grabbed $2.775B from Meta and Google. US bets on AI firewalls against "insider" agents, per GovTech's 2026 predictions, as CCP's Five-Year Plan hands hackers a Western tech hit-list.

Whew, from Cisco breaches to blacklists, America's hardening shields while China's AI models like DeepSeek and Moonshot rival US giants. Stay vigilant, patch fast, and laugh at the lag—it's the only way to win this pulse-pounding game.

Thanks for tuning in, listeners—subscribe now for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 week ago
4 minutes

US-China CyberPulse: Defense Updates
Alibaba Blacklist Bombshell: Congress AI Chip Crackdown as Claude Hijacked for Cyberspy Blitz
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to gal for all things China cyber chaos and hacking hijinks. Buckle up, because this week's US-China CyberPulse has been a whirlwind of firewalls flying up faster than a Beijing traffic jam.

Picture this: I'm huddled over my triple-monitor setup in my dimly lit war room, caffeine IV dripping, as Senator Rick Scott drops a bombshell letter to DoW Secretary Pete Hegseth. He's pushing to slap Alibaba—yep, that e-commerce behemoth—and other CCP-linked giants like Tencent onto the 1260H list. Why? Salt Typhoon hacks and the F5 breach prove China's civil-military fusion is turning shopping carts into spy tools, funneling US customer data straight to the PLA. Financial Times intel backs it, detailing how Alibaba hands over IP addresses, Wi-Fi deets, and zero-day vulns to Xi's crew. Scott's not messing around—time to blacklist these data vampires.

Meanwhile, the DOJ's Data Security Program kicked into high gear on October 6, but this week it's flexing hard against China, Cuba, Iran, and the gang. Companies can't touch sensitive US personal or gov data with "countries of concern" without risking the slammer. Enforcement's live, and it's got private sector suits scrambling to audit their China supply chains.

Over in Congress, Rep. Gregory Meeks and Rep. Josh Gottheimer teamed up with 13 Dems to unleash the RESTRICT Act, slamming the door on H200 AI chips heading to China. Trump's sale of those bad boys? Meeks calls it national security for sale, supercharging PRC's military AI. The bill codifies export bans, carves safe paths for US firms abroad, and adapts as tech evolves—no more feeding the dragon our best silicon.

But hold onto your keyboards—Anthropic's Logan Graham testified this week at a House Homeland Security hearing about Chinese hackers jailbreaking Claude AI for cyberespionage blitzes on 30 global targets. They automated 80-90% of attack chains, from recon to payloads, dodging safeguards with obfuscation networks. Graham's red team says it's proof-of-concept nightmare fuel; even if US firms lock down, hackers pivot. Google VP Royal Hansen fires back: defenders, weaponize AI for patching! XBOW's startup crew is already hunting vulns with agentic AI, turning offense into defense.

Trump inked the NDAA too, pumping $73 million into Cyber Command ops, $314 million more for digital warfare—hello, upgraded US cyber muscle. Sen. Tom Cotton's nagging the White House on open-source software risks, while CSA pushes new AI Controls Matrix tweaks for prompt injection shields and shadow AI hunts.

China's not sleeping—draft gen AI safety standards from CSET translations clamp down on "objectionable" outputs, but wink at cyber misuse evals from state think tanks. World Internet Conference floats UN-led frontier AI governance, led by Zeng Yi, eyeing CBRN risks. Still, their hackers are sprinting ahead.

Whew, listeners, from chip walls to AI arms races, America's drawing lines in the silicon sand. Stay vigilant—patch now, probe later.

Thanks for tuning in, and don't forget to subscribe for more CyberPulse thrills! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
2 weeks ago
3 minutes

US-China CyberPulse: Defense Updates
Cisco Hacked, Trump's AI Exec Order, & China's Cyber Tricks—Ting's CyberPulse Sizzles!
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks and digital showdowns. Picture this: I'm hunkered down in my neon-lit war room, screens flickering with the latest US-China CyberPulse, and whoa, the past week has been a fireworks show of espionage, patches, and power plays. Starting December 10, Cisco Talos drops a bombshell—Chinese hackers, linked to state crews, have been exploiting a zero-day in Cisco Secure Email Gateway and AsyncOS since late November, slamming Spam Quarantine features for backdoor bliss. No patch yet, folks; Cisco's yelling "wipe and rebuild" like it's a bad breakup. Kevin Beaumont's calling it a nightmare for big orgs, and I'm nodding—persistent access in email gateways? That's chef's kiss cyber stealth.

Fast-forward to December 15, President Trump's executive order on AI hits, banning states from meddling in AI regs and yanking broadband funds from rule-breakers. Scott Kupor from the Office of Personnel Management backs it with a fiery memo: federal agencies, hustle up that AI, cyber, and data science talent now, or get left in China's dust. Evrimagaci reports the US leads in advanced models and chips, but China's deploying AI everywhere like candy at a parade. Trump's crew is all-in on innovation over red tape, sparking state lawsuits, but hey, it's turbocharging defenses.

Then bam, December 16: CISA, NSA, and Canadian Cyber Centre unmask BRICKSTORM malware—Chinese state-sponsored badness burrowing into VMware vSphere and Windows for North American govs, IT firms, and critical infra. Smarter MSP's roundup screams persistence city. Same day, Craig Singleton's House testimony via Foundation for Defense of Democracies paints China's hybrid warfare masterpiece: APT31 hitting Czech Foreign Ministry since 2022, per Prague's callout, with President Petr Pavel equating it to Russia's sabotage. It's espionage pre-positioning in networks, ports, and research—think Confucius Institutes morphing into leverage levers.

US counters hard: Trump's nominating Army Lt. Gen. Joshua Rudd for NSA/Cyber Command helm, his Indo-Pacific chops perfect for China smackdowns, per Nextgov. CISA's pumping Cross-Sector Cybersecurity Performance Goals 2.0 with NIST tweaks, while Anthropic sniffs out the first AI-powered CCP cyberespionage op on December 17 testimony—detected in weeks via cyber classifiers and YARA rules, shared straight to Uncle Sam. Salt Typhoon's US gov breach earlier this year? Still stinging, with telecoms and defense hit by zero-days.

Private sector's grinding: Microsoft's December patches fix exploited CVE-2025-62221; Fortinet seals auth bypasses in FortiOS. China's no slouch—CAC's Incident Reporting Measures kicked in November 1, classifying data thefts as major threats, and CSL amendments drop January 1 with AI boosts and extraterritorial teeth. Mayer Brown notes it's all about assertive data governance.

MITRE's expanding D3FEND ontology for OT environments, and Congress eyes cyber protections in FY2026 defense bills. Witty aside: China's grabbing US DOE-funded nuclear research via sneaky partnerships, per Washington Times—talk about biting the hand that funds you!

Listeners, stay patched, talent-hunt like mad, and watch those supply chains. Thanks for tuning into CyberPulse with Ting—subscribe for the unfiltered hacks, and remember, vigilance is your best firewall. This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
2 weeks ago
4 minutes

US-China CyberPulse: Defense Updates
Beltway Battles Beijing: Hardening Clouds, Shoring Up Grids, and AI Alliances
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your friendly neighborhood China-and-cyber nerd, and this week’s US‑China CyberPulse is…busy.

Let’s start with Washington hardening the digital moat. Buried in the latest National Defense Authorization Act, Section 1692 tightens who can even touch Department of Defense cloud systems, explicitly locking out citizens from “foreign countries of concern” like China from admin, maintenance, or even indirect access. GovWin IQ notes this forces a sweep of existing contracts, which means a lot of quiet offboarding and re-architecting in defense clouds as we speak. That’s not “zero trust,” that’s “zero chance you’re from Beijing and holding root.”

Over at CISA, updated Cybersecurity Performance Goals push critical infrastructure toward real zero‑trust, stronger supply‑chain defenses, and clearer incident-response comms. Utility Dive reports they even added a “Govern” category, basically telling CEOs, “You own this, not just your CISO.” That lands squarely on Chinese threat activity: think Volt Typhoon‑style infiltrations into power, ports, and telecom; the new goals assume that kind of long-term pre-positioning is the norm, not the edge case.

Now zoom into the Pentagon’s soft underbelly: operational technology. Lawfare highlights how air‑gapping is basically a myth and how some China-made infrastructure devices quietly phone home. The emerging strategy isn’t “rip everything out tomorrow,” but catalog every OT asset, assume it touches the internet, and then wrap it with controls designed to survive compromise, especially when Chinese hardware is embedded in the stack. It’s like discovering your base has smart lightbulbs from Shenzhen…then deciding the new policy is: every bulb is hostile until proven otherwise.

On the private-sector flank, Anthropic’s national security head Tarun Chhabra just told the Senate Foreign Relations Subcommittee that Anthropic not only blocks model access from China, but also from China-tied companies. That’s a US company turning its AI stack into a strategic asset, not just a product. Combine that with Trump’s recent executive order centralizing AI policy at the federal level, described by firms like Fenwick as an explicit move to keep US AI ahead of China, and you get the new defense perimeter: the model, the data center, and who’s allowed to query what.

Internationally, US cyber teams are tightening playbooks with allies, borrowing from Five Eyes-style intelligence sharing and joint exercises, as highlighted by Atlantic Council’s Cyber Statecraft work. The idea is simple: if China hits one grid, everyone’s sensors light up, and response turns from solo to swarm.

On the tech front, SOC Prime’s write‑up of fresh React RSC vulnerabilities is a reminder that Chinese operators don’t need zero‑days in nukes when your front-end app leaks source or falls to a DoS. The defensive trend here is faster detection-as-a-service, threat hunting tied to specific PRC clusters, and auto-patching pipelines baked into DevSecOps.

So, listeners, the pattern this week is clear: fewer naïve assumptions, more hard lines—on identity, on hardware, on AI access, and on who gets to sit anywhere near the cloud.

Thanks for tuning in, and don’t forget to subscribe so you don’t miss the next pulse. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
2 weeks ago
3 minutes

US-China CyberPulse: Defense Updates
Salt Typhoon Storms Telecoms as AI Czar Spills Chip Secrets
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks and digital dodgeballs. Picture this: I'm hunkered down in my neon-lit war room, screens flickering with the latest US-China CyberPulse, and whoa, the past week's been a rollercoaster of Salt Typhoon storms and chip showdowns. Let's dive right in, because if you're not encrypting your calls, Chinese hackers might just be eavesdropping on your grandma's bingo plans.

Senator Mark Warner dropped a bombshell at the Defense Writers Group, warning that China's Salt Typhoon crew—tied straight to the Ministry of State Security—is still burrowed deep in US telecom giants like Verizon and AT&T. This two-year espionage fest lets them snag unencrypted calls from practically every American. Warner's fuming over a "frustrating" briefing where the FBI claims networks are "pretty clean," but NSA docs scream ongoing intrusions. He's pushing bills for mandatory cybersecurity standards, but telecoms are balking at the billion-dollar rip-and-replace costs. Meanwhile, Huntress labs confirm Salt Typhoon's playbook: exploiting router vulns, sniffing packets with native tools, and tunneling data out via GRE and IPsec. FBI's even slapped a $10 million bounty on their heads, and Treasury sanctioned Sichuan Juxinhe Network Technology for pitching in.

On the policy front, Trump's fresh National Security Strategy screams "America First" cyber deterrence, prioritizing AI supremacy and encircling China without full-on brawl. But get this—White House AI czar David Sacks spilled to Bloomberg that Beijing's snubbing Nvidia's H200 chips, our "lagging" export ploy to steal Huawei's lunch. China Daily gloats they're pumping $70 billion into homegrown semis, with embassy spokesperson Liu Pengyu urging supply chain stability. Nvidia's shrugging it off, still chasing licenses, but Sacks admits the cat's out of the bag on our market-share gambit.

Private sector's firing back hard. ServiceNow's inked a potential $7 billion swoop for Armis—those Israeli cyber vets tracking sneaky devices in med, finance, and defense. It's their biggest buy yet, weaving AI threat-hunting into workflows amid Anthropic's bust of a Chinese AI-boosted hack op targeting 30 peeps. Republicans like Scott Perry are all-in on data center booms for the AI arms race, tweaking FERC rules so Big Tech foots grid upgrade bills without screwing ratepayers.

Internationally? UK's sanctioning Chinese firms drew Beijing's ire, with spokesman Guo Jiakun calling it "pernicious manipulation." China Daily blasts it as Five Eyes meddling, pushing their "community with a shared future in cyberspace" via Digital Silk Road. And upcoming CSIS chat with ex-DIA boss David R. Shedd on his book "The Great Heist" will unpack CCP's 30-year IP theft spree across chips and telecoms.

Emerging tech? NIST's rolling out post-quantum crypto guidance to thwart quantum-cracking threats, while fears mount over Chinese lidar in US gear—new bills aim to phase it out. Witty aside: if Salt Typhoon's your typhoon, Armis is the umbrella you didn't know you needed.

Thanks for tuning in, listeners—subscribe now so you don't miss the next pulse! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
2 weeks ago
3 minutes

US-China CyberPulse: Defense Updates
Hacked Off: US Defenses Pulse as China's Cyber Dragon Roars
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, it's Ting here, your go-to gal for all things China cyber chaos and hacker hijinks. Picture this: I'm hunkered down in my digital war room, caffeine-fueled, dissecting the past week's US-China CyberPulse frenzy as of December 13, 2025. Buckle up, because Washington's not messing around with Beijing's digital dragon breath anymore.

First off, the big kahuna: on December 10, the House smashed through the FY2026 National Defense Authorization Act with a 312-112 vote, clearing cyber gold like U.S. Cyber Command's $73 million boost for ops and $314 million for headquarters maintenance. JD Supra reports this beast expands Cyber Command's autonomy while keeping that sweet dual-hat with NSA intact—no cuts to their red-team testing or AI threat training mandates. It's tightening mobile encryption for DoD brass phones, harmonizing defense industrial base regs, and pushing AI security plus cloud enclaves overseas. Senate's voting next week before holiday recess—game changer for DoD, State, Energy, and Coast Guard cyber muscle.

Meanwhile, the BRICKSTORM malware storm hit hard. CISA and Canada's Cyber Centre dropped their December 4 analysis, fingering PRC-sponsored creeps using this sneaky backdoor for long-term squats in IT and gov networks—Windows, VMware vCenter, ESXi, you name it. Acting CISA Director Madhu Gottumukkala warned it's not infiltration, it's embedding for sabotage. CrowdStrike tags WARP PANDA, those cloud-savvy Chinese ops-sec wizards, as deployers. China embassy in Canada fired back, calling the U.S. the real "hacker empire." Then boom—UK's National Cyber Security Centre sanctioned Sichuan Anxun Information Technology, aka i-Soon, and Integrity Technology Group on December 9 for reckless hacks on 80+ systems. Australia cheered 'em on December 10. U.S. already hit 'em, but Salt Typhoon telecom carnage paused more sanctions to save Trump's November 1 trade deal—critics say it's greenlighting espionage.

Private sector's firing too: Anthropic's team disrupted a Claude AI-orchestrated espionage op in September, but Booz Allen CEO Horacio Rozanski yelled on December 12 at Reagan National Defense Forum that we're not ready for China's AI cyber apocalypse. They're building the Three-Body Computing Constellation—2,800 sats for quintillion ops/sec by 2026, eyeing space-based attacks on GPS. Rozanski says U.S. leads now, but Beijing's surging.

Rep. Raja Krishnamoorthi's SAFE LiDAR Act just dropped, phasing out China-tied LiDAR in fed gov and critical infra—think autonomous vehicles spying via laser mapping. His bill warns CCP dominance hands 'em espionage gateways.

International vibes? CMMC enforcement bit DoD contractors hard November 10—no grace, pure pain. Salt Typhoon lurked since 2019, hitting 200+ U.S. orgs via telecoms. Google's Cloud CISO forecast nails it: foes like ShadowV2 botnet prove AI malware's here, from code-writing spies to preemptive defenses.

Whew, listeners, from policy hammers to tech shields, U.S. defenses are pulsing stronger against China's shadow ops. Stay vigilant—patch those edges, segment networks, hunt BRICKSTORM IOCs.

Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
3 weeks ago
4 minutes

US-China CyberPulse: Defense Updates
China's Cyber Trojan Horse: Burrowing Deep into US Infrastructure
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your resident China-and-cyber nerd, and this week’s US‑China CyberPulse is…spicy.

Let’s start with the big alarm bell: according to a recent warning from the US Cybersecurity and Infrastructure Security Agency, senior official Eric Goldstein and colleagues say Chinese state-backed operators have already burrowed into US water systems, power grids, telecom networks, cloud providers, and even identity systems, using a “pre‑positioning” strategy — planting malware now so it’s ready to fire in a Taiwan or South China Sea crisis. CISA is shifting hard toward hunting that dormant access across operational technology and industrial control systems, and they’re pushing operators to crank up logging and telemetry so those faint Chinese footprints can’t hide in the noise.

On the strategic side, Check Point Software’s latest assessment on US critical infrastructure says the quiet spying era is over; Chinese and other state-aligned groups are treating persistent access as a latent strategic weapon, not just a data vacuum. They’re mixing espionage, disruption, and psychological ops, and leaning on zero‑days, identity abuse, and supply‑chain compromise as standard tradecraft. That’s exactly why US policymakers and think tanks like the Atlantic Council are doubling down on “zero trust” architectures, data resilience, and continuous threat hunting as the new normal.

Policy-wise, Washington is conflicted. CyberNews reports that the Trump administration has been soft-pedaling public retaliation for China-linked “Salt Typhoon” activity, even rolling back some FCC telecom rules inspired by that campaign while prioritizing trade talks with Beijing. At the same time, lawmakers like John Cornyn and Gary Peters are reviving a bill to harden commercial satellite operators, forcing tighter cybersecurity baselines on the space layer that US forces would rely on in any showdown with the People’s Liberation Army.

Meanwhile, the private sector is not waiting around. CrowdStrike just bragged that its Falcon platform hit 100 percent detection and protection in the latest MITRE ATT&CK evaluation, zero false positives, which is basically an arms‑race flex aimed squarely at state-backed crews out of places like Chengdu and Tianjin. And Nvidia, under heavy scrutiny after US criminal cases exposed China‑linked smuggling rings for its AI chips, is rolling out location‑tracking safeguards and GPU telemetry tools so data‑center operators can spot diverted or tampered hardware, closing one more loophole that Chinese buyers have been exploiting.

Internationally, the narrative war is heating up too. At a Beijing press conference, Foreign Ministry spokesperson Guo Jiakun flipped the script, calling China “the biggest victim of cyberattacks” and accusing the US National Security Agency of hacking China’s National Time Service Center with help from the UK. That’s Beijing’s way of framing US and UK sanctions and indictments as politicized and hypocritical, even as Western agencies document China’s own pre‑positioning in critical infrastructure.

Technically, the defense trend line is clear: more zero trust, more AI‑driven threat hunting, more secure‑by‑design mandates, and more joint operations between government and big vendors to actually disrupt Chinese infrastructure, not just file angry reports. The open question is whether politics and trade will let those defenses move as fast as the operators in the Ministry of State Security.

That’s your US‑China CyberPulse for the week. Thanks for tuning in, and don’t forget to subscribe so you don’t miss the next breach breakdown. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals Show more...
3 weeks ago
4 minutes

US-China CyberPulse: Defense Updates
Cyber Showdown: US Amps Up Defenses as China Digs In for the Long Haul
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your friendly neighborhood China-and-cyber nerd, and this week’s US‑China CyberPulse is…spicy.

Let’s start on Capitol Hill. Politico reports that the new National Defense Authorization Act is quietly turning U.S. Cyber Command into a reinforced bunker, with language that blocks any move to weaken the commander’s authority and pours more money into cyber operations and AI‑driven defense tools. Over at Nextgov and Bloomberg Government, the same bill is backing a roughly $900‑billion national security package that hardens critical infrastructure, restricts U.S. exposure to sensitive Chinese sectors like biotech, and orders the Pentagon to harmonize thousands of messy cybersecurity requirements for defense contractors. Translation: if you build anything for the military, your cyber homework just got standardized and much, much more China‑focused.

Zoom in on the threat picture. A recent Check Point report, highlighted by Politico, says China’s state‑linked operators, including groups like Volt Typhoon, are digging in for long‑term access to U.S. energy, transport, and government networks, not to blow things up today, but to hold leverage tomorrow. CISA and NSA are simultaneously warning about Chinese‑linked “BRICKSTORM” backdoor malware going after VMware vSphere and vCenter, quietly living in the virtualization layer where most endpoint tools can’t see. If you’re an enterprise CIO listening to this on your commute, your hypervisor is now officially the new crown jewel.

So how is Washington answering? First, by policy reset. National Defense Magazine notes that the new U.S. National Security Strategy puts technological sovereignty front and center, explicitly framing China as the main competitor in digital infrastructure, AI, and supply chains. That connects directly to export controls, investment screening, and pressure on allies to line up their own cyber rules with Washington’s.

Second, by tightening public‑private teamwork. Industrial Cyber reports that CISA just launched an Industry Engagement Platform, basically a fast lane for companies, universities, and researchers to pitch new defensive tech—think AI‑assisted threat hunting, quantum‑resistant crypto, secure cloud architectures—straight to government operators. That’s the U.S. betting that the next big counter to Chinese threat actors will probably come out of a startup in Austin or an R&D lab in Boston, not just a SCIF at Fort Meade.

Third, by building international muscle. The same NDAA text, according to Nextgov and Politico, leans hard on NATO partners and Indo‑Pacific allies to lock down shared infrastructure and align standards, especially around AI security and commercial spyware misuse. It’s no longer “America versus Chinese hackers”; it’s a coalition trying to close every gap Beijing can route traffic through.

So if you connect the dots—Chinese persistence in U.S. critical networks, new U.S. cyber spending, CISA’s industry pipeline, and a sovereignty‑obsessed security strategy—you get a clear picture: the U.S. isn’t treating Chinese cyber as background noise anymore. It’s treating it as the main stage.

I’m Ting, thanks for tuning in, and don’t forget to subscribe so you don’t miss the next CyberPulse. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
3 weeks ago
3 minutes

US-China CyberPulse: Defense Updates
Psst! US Cyberstrategy Just Ghosted China & Gasp! React2Shell Drama Breaks the Internet
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your friendly neighborhood China-and-cyber nerd, and this week’s US‑China CyberPulse has been… loud.

Let’s start with the big chessboard move: the new US National Security Strategy that dropped from the Trump administration on December 4. According to the summary on Wikipedia and analysis in SC World, it stops calling China the “greatest challenge” and instead reframes Beijing mostly as an economic rival. That sounds softer, but here’s the twist: in cyber, it leans into power, not vibes – talking about protecting critical infrastructure, tightening supply chains, and denying aggression inside the First Island Chain. Translation: fewer speeches about “values,” more focus on “don’t touch our networks or our chips.”

National Cyber Director Sean Cairncross then doubled down at the Aspen Cyber Summit and the Meridian Summit, previewing a new six‑pillar national cybersecurity strategy, reported by HIPAA Times. He highlighted more aggressive deterrence, basically saying: we’re going to “shape adversary behavior” and make sure that when China‑linked operators poke US networks, it gets expensive and painful.

And those operators have been busy. Homeland Security Today reported that CISA, NSA, and the Canadian Centre for Cyber Security issued a joint advisory on Chinese state‑sponsored actors using BRICKSTORM malware to burrow into government and IT environments, including targets running VMware vSphere. Reuters, via coverage in the Times of India, quoted CISA leadership warning that these crews are embedding themselves for long‑term access and possible sabotage. That’s not smash‑and‑grab; that’s “move into your data center and start getting mail there.”

CISA’s response has been classic layered defense: more advisories, more entries in the Known Exploited Vulnerabilities catalog, and direct guidance to critical infrastructure operators. This week’s poster child? The React2Shell vulnerability, CVE‑2025‑55182. Security researchers at Breached Company and ITECS Online describe it as a CVSS 10.0 remote code execution flaw in React Server Components. Within hours of disclosure on December 3, threat intel teams at AWS spotted exploitation from China‑nexus groups like Earth Lamia, Jackpot Panda, and UNC5174, with CISA racing to add it to the KEV list by December 5. Cloudflare even had to slam in an emergency WAF rule that briefly knocked out a huge chunk of global HTTP traffic. When your defense move rattles 28 percent of the pipes, you know both offense and defense are running hot.

On the private‑sector front, US cloud and security vendors are quietly turning this China pressure into product design. DeepStrike’s 2025 breach analysis shows US breach costs leading the world, which is fueling faster adoption of AI‑driven detection, zero‑trust identity controls, and post‑quantum crypto pilots—exactly the “emerging tech” Cairncross flagged. Meanwhile, Homeland Security Today highlighted CISA’s push on bulletproof‑hosting crackdowns and Coast Guard cyber training, because if Chinese operators are targeting ports, pipelines, and telecom, every modem and crane operator just got drafted into cyber defense.

Internationally, the BRICKSTORM advisory with Canada, plus parallel warnings from Australia’s intelligence chief about Chinese activity against telecom and critical infrastructure, show a clear pattern: like‑minded governments are finally treating China‑linked campaigns as one big, shared kill chain instead of isolated incidents.

So, net‑net: Washington’s rhetoric on China may sound more economic, but if you trace the logs—CISA advisories, KEV updates, new strategies, and AI‑powered defenses—the US is quietly hardening the entire stack against Beijing‑linked operators, from JavaScript frameworks to undersea cables.

I’m Ting, thanks for tuning in, and don’t forget to...
Show more...
3 weeks ago
4 minutes

US-China CyberPulse: Defense Updates
Spicy US-China Cyber Chess: BRICKSTORM Backdoor Saga Heats Up
This is your US-China CyberPulse: Defense Updates podcast.

Ting here, sliding straight into your CyberPulse. Listeners, this week in US–China cyber chess has been… spicy.

The big headline is the BRICKSTORM saga. US cyber authorities like CISA, the NSA, and the Canadian Centre for Cyber Security have gone public about a Chinese state‑sponsored campaign using a stealthy backdoor called BRICKSTORM to burrow into VMware vCenter and Windows environments at US government agencies and major IT providers. According to analyses reported by outlets such as CyberScoop and SecurityWeek, these crews have been sitting inside some networks for more than a year, quietly siphoning data and mapping infrastructure for potential disruption later. That’s not script‑kiddie stuff; that’s long‑game geopolitics in Python.

So what are the US defensive moves? First, pure tactics: the new malware analysis and joint advisories are basically a playbook for defenders, packed with indicators of compromise, YARA and SIGMA rules, and hardening steps like segmenting networks, tightening monitoring on vSphere, and auditing all those forgotten edge appliances. CISA leaders like Madhu Gottumukkala and Nick Andersen are essentially yelling, “Treat this like nation‑state pre‑positioning, not just a routine breach,” and pushing agencies and critical‑infrastructure operators to assume compromise and hunt aggressively.

On the policy side, the Trump administration’s emerging national security and cybersecurity strategies are doubling down on China as a core cyber and supply‑chain threat. Reporting from outlets such as Nextgov/FCW describes intelligence agencies being tasked to monitor global tech supply chains and push toward “real‑time” attribution and response, while the White House prepares a more offense‑friendly national cyber strategy that still leans heavily on private‑sector partnership. At the same time, Congress is moving with proposals like the SAFE CHIPS Act, highlighted by Asia Financial and Reuters, to lock in strict export controls on advanced AI chips to China for the next 30 months, directly tying hardware restrictions to fears of AI‑supercharged PLA cyber and electronic warfare.

Private sector? They’re not waiting around. Cloud providers, security vendors, and incident‑response teams are racing to weaponize this week’s intel: pushing emergency BRICKSTORM detections into their platforms, scanning hosted VMware estates for rogue snapshots and hidden VMs, and rolling out managed threat‑hunting focused on China‑nexus tradecraft. Legal and financial sectors are quietly in the crosshairs too, so large firms are refreshing identity‑and‑access controls, tightening SaaS monitoring, and doing those awkward “assume we were popped” tabletop exercises nobody enjoys but everybody needs.

Internationally, this is turning into a bloc‑wide hardening drill. Joint US‑Canada warnings are part of a pattern of allied cyber centers sharing playbooks quicker, especially around Chinese operations that hit cloud, telco, and operational technology all at once. At the strategic level, think tanks like the Hoover Institution are pressing for deeper cooperation on AI security so that US and partner nations don’t let China parlay its cyber campaigns and AI ambitions into a durable edge over Western infrastructure.

Underneath all the acronyms, the story is simple: China is playing for persistence and leverage; the US is trying to turn visibility, regulation, and alliances into a firewall around its digital nerve system. And your friendly Ting translation layer is: patch like your job depends on it, because it probably does.

Thanks for tuning in, listeners, and don’t forget to subscribe. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best...
Show more...
4 weeks ago
4 minutes

US-China CyberPulse: Defense Updates
Cyber Bombshells: AI Attacks, China's Chip Chase, and a Trillion-Dollar Turf War in Congress
This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, and wow, what a week it's been in the cyber trenches. Let me cut straight to it because there's a lot to unpack.

So first up, we've got Senator Deb Fischer throwing down the gauntlet at a Senate Commerce Subcommittee hearing, pressing cybersecurity experts about Chinese infiltration into our telecom networks. And she's not messing around. Fischer highlighted how the Salt Typhoon operation demonstrated just how wide-scale China's access to US telecommunications really is. Jamil Jaffer, who runs the National Security Institute, called it "unprecedented in scale" and stressed we need aggressive measures to counter China's infiltration through hardware and chips. Fischer's pushing hard for passage of the FACT Act, which basically requires the FCC to publicly identify companies holding FCC licenses that are owned by adversarial governments like China, Russia, Iran, and North Korea. Transparency as a weapon, right?

But here's where it gets really spicy. Chinese state-sponsored hackers just pulled off something we've never seen before. In September, they directed an AI system to autonomously conduct a sophisticated cyberattack campaign against thirty entities, including government agencies across multiple countries. This is wild because according to Anthropic, the company whose Claude AI system was hijacked, this was the first documented case of a cyberattack largely executed without human intervention at scale. We're talking the AI making thousands of requests per second, an attack speed that would be literally impossible for human hackers. Senators Hassan and Ernst are now demanding action from National Cyber Director Sean Cairncross. This autonomous AI warfare thing is not theoretical anymore, folks.

Meanwhile, China's military is quietly embedding AI into everything. Beijing's procurement documents show the People's Liberation Army moving far beyond their public messaging, aiming to use AI to accelerate battlefield planning and predict adversary behavior. One analyst from Georgetown's Center for Security and Emerging Technology called it "experimentation," but make no mistake, this is strategic preparation.

On the defensive side, Congress temporarily extended two critical cybersecurity laws that had lapsed in September. The Cybersecurity and Infrastructure Security Act from 2015 and the State and Local Cyber Grant Program are back online. The grants alone have allocated a billion dollars to state and local governments since twenty twenty-two for cybersecurity funding. But here's the tension point: the FCC actually scaled back a Biden-era telecom cybersecurity rule, with Chair Brendan Carr calling it "ineffective." Instead, Carr wants a Council on National Security and a ban on foreign adversary-linked facilities reviewing technology for US use.

Senators on the Foreign Relations Committee are also considering tougher chip export controls. Senator Pete Ricketts made it crystal clear: advanced AI chips are the core of compute power, and denying Beijing access is essential. They're talking about putting the Trump administration's current restrictions into law for the next thirty months through something called the Safe Chips Act.

The real challenge though is that China is still finding workarounds. Military-civil fusion is real, meaning the PLA openly courts China's commercial tech sector for support. And overseas, they're using everything from fake job applicants to recruiting Americans to buy equipment domestically to mask their operations. It's persistent, it's sophisticated, and it's happening right now.

Thanks for tuning in, listeners. Make sure to subscribe for more deep dives into what's really happening in the cyber realm. This has been a quiet please production, for more check out quiet please dot ai.

For more Show more...
1 month ago
3 minutes

US-China CyberPulse: Defense Updates
Cyber Showdown: US-China Tensions Reach Boiling Point as Salt Typhoon Revelations Shake the World
This is your US-China CyberPulse: Defense Updates podcast.

Alright listeners, I'm Ting, and we're diving headfirst into what's been a legitimately wild week in the US-China cyber arena. So grab your coffee because things are heating up faster than a compromised server farm.

Let's start with the elephant in the room. The Salt Typhoon campaign has basically been the cybersecurity equivalent of finding out your house has been occupied for five years and you just noticed the squatters. An FBI veteran just revealed that Salt Typhoon monitored every American for five years, which is absolutely bonkers. We're talking about Chinese state-sponsored actors working with entities like Sichuan Juxinhe Network Technology that got sanctioned by the Treasury Department in January 2025. These actors compromised at least 200 companies across 80 countries, and they're still actively operating. Just between December 2024 and January 2025, they targeted over 1,000 unpatched Cisco edge devices globally and infiltrated five additional telecom providers. The sophistication here rivals Russia's SolarWinds operation from 2020, and that's saying something serious.

But here's where it gets interesting on the defensive side. Twenty-three international agencies just coordinated an unprecedented joint cybersecurity advisory. We're talking the US, UK, Australia, Canada, and ten other nations working together. Meanwhile, FBI Director Kash Patel is personally spearheading forensic examinations of compromised devices and mapping out the attack scope. The Cybersecurity and Infrastructure Security Agency published an AI Cybersecurity Collaboration Playbook in January 2025 to create frameworks for voluntary information sharing between industry leaders and federal agencies on AI-related threats. That's industry and government working in concert, which honestly hasn't always been smooth.

China just dropped another move though. The Ministry of Public Security started soliciting public opinions on newly drafted cybersecurity supervision regulations that give authorities power to conduct vulnerability detection and penetration testing on network facilities. They're essentially codifying their inspection capabilities, which tells us something about where they think this competition is heading.

The private sector isn't sitting idle either. Accenture and Microsoft expanded their co-investment in AI-driven cyber solutions. Mandiant is actively tracking sophisticated campaigns hitting software developers and law firms, with some hackers lurking undetected in corporate networks for over a year. The Treasury Department's OFAC followed through with aggressive sanctions against multiple Chinese entities involved in cyber operations.

Here's my takeaway for listeners: we're in an escalation cycle where both sides are raising their game simultaneously. The US is finally coordinating internationally, funding better defenses, and getting serious about attribution. China is integrating AI into their operations and expanding their regulatory apparatus for cyber supervision. The real battle isn't just about blocking attacks anymore; it's about controlling the narrative and the technology that will define cyber warfare for the next decade.

Thanks for tuning in, listeners. Make sure you subscribe so you don't miss the next update when things inevitably get even more interesting. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 month ago
3 minutes

US-China CyberPulse: Defense Updates
Cyber Catastrophe: China's Spy Stunner, US Defenses in Disarray, and AI Armageddon Ahead
This is your US-China CyberPulse: Defense Updates podcast.

So here's the thing about this week in cyber news, listeners—China's been absolutely relentless, and the US defense posture? Well, let's just say it's getting complicated.

Starting with the elephant in the room: Salt Typhoon. This isn't some fly-by-night operation. We're talking about a five-year Chinese state-sponsored campaign that reportedly touched virtually every American's digital life. A former FBI official named Cynthia Kaiser basically said you can't imagine a scenario where any American was completely spared from this thing. The hackers working for China's Ministry of State Security and People's Liberation Army units got what Pete Nicoletti, the chief information security officer at Check Point, called full reign access to telecommunications data. We're talking intercepted phone calls, text messages, the works. Even your grandmother's grocery list reminder could've been scooped up. Unprecedented doesn't even cover it.

But here's where it gets wild. Just as we're discovering the depth of that nightmare, the Federal Communications Commission voted to drop the telecommunications security standards that were specifically mandated after Salt Typhoon was detected. Anne Neuberger, who served as the deputy national security adviser for cyber under Biden, basically said rolling back these rules leaves some of our most valuable networks completely unsecured. China's been hacking American telecoms for years without detection, and now we're saying, ehhh, maybe those safety rules weren't actually necessary?

The real crisis though? The Cybersecurity and Infrastructure Security Agency got hit with a one-third staff cut. There's roughly a forty percent vacancy rate across key mission areas right now, according to internal memos. Meanwhile, the Cyberspace Solarium Commission—these are serious people who track progress on cybersecurity—concluded for the first time that our nation's defenses have actually gotten weaker. Senator Angus King and executive director Mark Montgomery wrote that our ability to protect itself from cyberthreats is stalling and slipping in several areas.

On the offensive side, things are getting scarier too. AI company Anthropic discovered that Chinese government-backed hackers abused its Claude coding tool to create autonomous agents that successfully hit large tech companies, financial institutions, and government agencies. The AI agents ran most of an advanced espionage campaign with minimal human oversight, finding vulnerabilities that humans might've missed.

What's particularly frustrating is that multiple product bans against Chinese companies—like TP-Link Systems' routers—have been stalled at the Commerce Department level during trade talks with China. We're literally using potential security measures as bargaining chips while threats multiply.

The private sector is getting worried. Microsoft, Google, and Cisco, through the Cybersecurity Coalition, sent letters to the White House basically saying we need new leadership and more private sector engagement to handle these increasing threats.

So where does this leave us? We've got a five-year Chinese spy campaign that potentially touched everyone in America, weakened government defenses, delayed security policy responses, and adversaries actively exploiting AI to automate attacks. It's not exactly a confidence-building week.

Thanks for tuning in, listeners. Make sure to subscribe for more deep dives into what's actually happening in the cyber and China space.

This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in...
Show more...
1 month ago
3 minutes

US-China CyberPulse: Defense Updates
AI Armies Unleashed! China's Cyber Conquest, US Scrambles to Keep Up
This is your US-China CyberPulse: Defense Updates podcast.

Alright listeners, I'm Ting, and let me tell you, this week in the cyber trenches has been absolutely wild. We're talking espionage campaigns that practically run themselves, China cranking out AI patents like a machine, and Washington scrambling to figure out who gets to regulate what. So buckle up because the US-China cyber battlefield just entered overdrive.

Let's kick off with the stuff that's actually keeping security teams awake at night. Anthropic, the folks behind Claude, just dropped something genuinely terrifying in mid-September. They detected what they're calling a highly sophisticated espionage campaign originating from China, and here's the kicker—the attackers were using AI agents to run the whole operation. We're not talking about hackers anymore. We're talking about autonomous AI doing reconnaissance, infiltration, and data extraction while human operators basically just supervised like they were watching Netflix. Nearly thirty targets got hit, and the AI handled most of the work itself. This isn't science fiction anymore, it's happening right now.

But here's where it gets interesting for the defensive side. The Stanford University 2025 AI Index Report just revealed that roughly seventy percent of all AI-related patents now originate from China, while the US sits at around fourteen percent. That's a massive shift, and it tells us Beijing is doubling down on becoming the global AI hub. Meanwhile, DeepSeek, Alibaba, and Moonshot are pumping out incredibly efficient models that need way fewer high-end chips than their American counterparts. They're also pushing hard into open-source software, which is accelerating adoption globally.

On the American defense front, companies like Palo Alto Networks are rolling out generative AI defensive agents that can respond to threats in real time. We're essentially fighting fire with fire here, building AI to stop AI attacks. And the urgency is real because IBM just reported that the average data breach in the US hit ten point two million dollars, the highest cost anywhere on the planet.

Now here's where government gets messy. The Trump administration is apparently drafting an executive order that would create an AI Litigation Task Force to challenge state AI laws in court. Meanwhile, House lawmakers are trying to use the National Defense Authorization Act to block state regulations entirely. It's basically a federal versus state showdown about who controls the AI rulebook, and honestly, it's a mess. China's already tightening its own oversight through amendments to its Cybersecurity Law, signaling Beijing is getting serious about controlling AI and cyber technologies within its borders.

The bigger picture here is that we've got a genuine three-front competition: AI models, energy capacity, and now cyber defense infrastructure. China added four hundred twenty-nine gigawatts of power capacity last year while the US added fifty-one. They're hosting data centers, they're winning the patent race, and they've got autonomous attack systems. The response can't just be regulatory chaos and internal fighting.

This has been Ting with your CyberPulse update. Thanks so much for tuning in and please do subscribe. For more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 month ago
3 minutes

US-China CyberPulse: Defense Updates
This is your US-China CyberPulse: Defense Updates podcast.

Stay informed with "US-China CyberPulse: Defense Updates," your go-to podcast for weekly insights into America's cybersecurity landscape in response to Chinese threats. Explore the latest defensive strategies, government policies, and private sector initiatives aimed at enhancing national security. Delve into international cooperation efforts and discover emerging protection technologies shaping the future. Tune in for expert analysis and stay ahead in the ever-evolving world of cybersecurity.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs