All Episodes

September 24, 2025 4 mins
This is your Tech Shield: US vs China Updates podcast.

Listeners, it’s Ting here, your cyber sherpa, with the hottest firewalls and frozen noodles straight out of this wild week in the US vs China cyber chess match. So, strap in—no long intros, just the mainframe download.

The buzz right now? The emergence of Brickstorm, uncovered by the wizards at Mandiant and Google’s Threat Intelligence Group. Imagine malware so stealthy it practically wears an invisibility cloak—except it’s real, powering China-linked espionage missions that have burrowed into US legal, tech, and SaaS firms for, wait for it, over a year without a peep. The main players? The hacking group UNC5221, which experts now call the “most prevalent adversary in the US.” Their aim: steal intellectual property, probe national security, and—my favorite—snatch vulnerabilities that could let them cook up future attacks whenever they want.

Why is Brickstorm so insidious? The attackers pick systems that don’t support conventional cybersecurity defenses—think VMware ESXi hosts or email security gateways—and sneak in undetected. By the time companies even realize what hit them—393 days on average—the hackers have often packed up and erased their tracks like a ninja in the night. Google’s John Hultquist compared this operation’s cunning to the infamous SolarWinds campaign, calling it “next-level activity.”

Cue the hero music: Google and Mandiant dropped a new scanner tool (think: “Malware Metal Detector 9000”) for organizations to hunt down signs of Brickstorm and respond. The government and industry have gone into overdrive, rolling out advisories and urging full forensic sweeps if any trace is found, since these hackers are known for using access from one victim to jump into downstream customer networks.

But it’s not all digital whack-a-mole; the Pentagon’s getting bolder too. Gen. Chris Mahoney, soon to be vice chairman of the Joint Chiefs of Staff, just raised the flag on electronic warfare, blending cyber and traditional EW—jamming, decoys, and tricking adversary sensors in a digital version of D-Day’s deception playbook. The new priority: building a deep arsenal of “good enough” cyber and electronic war tools, not just a handful of show-stopping exploits, but a steady tempo so the PLA never knows if what they see is real. Industry is racing to keep up, with defense firms and start-ups alike pitching in cyber effect delivery systems—EW drones, spoofing radars, the works.

Let’s spice it up with some hard truths: despite new tools and a sharper government response, there are gaping holes. Take research security; China’s AI research output has now leapfrogged the US and Europe combined, churning out AI patents at nearly ten times the US rate and fielding a younger, faster-growing researcher army. Daniel Hook from Digital Science is ringing alarm bells—America’s still pushing big money into AI R&D, but without better protection, breakthroughs can leak straight to Beijing.

The bottom line? The US is throwing new tech, advisories, and even virtual testing sandboxes at the problem. But with adversaries this patient, persistent, and well-funded, it’s still a whack-a-mole game—one where lapses in vigilance can set us back years.

So, listeners, stay patched, stay paranoid, and always ask, “Who’s watching my logs?” That’s the only way to keep the cyber dragons at bay.

Thanks for tuning in and don’t forget to subscribe for your weekly shield upgrade. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Listeners, it's ting here your cyber sharpa with the hottest
firewalls and frozen noodles, straight out of this wild week
in the US versus China cyber chess match. So strap
en no long intros, just the main frame download the
buzz right now. The emergence of brick Storm uncovered by
the wizards at Mandian and Google's Threat Intelligence group. Imagine

(00:22):
malware so stealthy it practically wears an invisibility cloak, except
it's real, powering China linked espionage missions that have borrowed
into US legal tech and SaaS firms for wait for it,
over a year without a peep. The main players the
hacking group u n C five two two one, which

(00:46):
experts now call the most prevalent adversary in the US.
Their aim steel intellectual property, probe, national security, and my
favorite snatch vulnerabilities that could let them cook up future
attacks whenever they want. Why is Brickstorm so insidious? The

(01:07):
attackers picked systems that don't support conventional cybersecurity defenses think VMware,
ESXi hosts or email security gateways, and sneaking undetected by
the time companies even realize what hit them. Three hundred
ninety three days on average. The hackers have often packed
up and erased their tracks like a ninja in the night.

(01:29):
Google's John Holtquist compared this operation's cunning to the infamous
Solar Winds campaign, calling it next level activity cue the
hero music. Google and Mandiant dropped a new scanner tool
think Malware Metal Detector nine thousand for organizations to hunt
down signs of brickstorm and respond. The government and industry

(01:51):
have gone into overdrive, rolling out advisories and urging full
forensic sweeps if any trace is found, since these hackers
are known for using axis from one victim to jump
into downstream customer networks. But it's not all digital Whackamar.
The Pentagon's getting bolder too. General Chris Mahoney, soon to
be Vice Chairman of the Joint Chiefs of Staff, just

(02:13):
raise the flag on electronic warfare, blending cyber and traditional ew,
jamming decoys and tricking adversary sensors in a digital version
of d Day's Deception Playbook. The new priority building a
deep arsenal of good enough cyber and electronic war tools,
not just a handful of show stopping exploits, but a

(02:34):
steady tempo, so the PLA never knows if what they
see is real. Industry is racing to keep up with
defense firms and startups alike, pitching in cyber effect delivery
systems EW drones, spoofing radars, the works. Let's spice it
up with some hard truths. Despite new tools and a
sharper government response, there are gaping holes take research security.

(02:59):
China's AIRIS research output has now leapfrog the US and
Europe combined, churning out AI patterns at nearly ten times
the US rate and fielding a younger, faster growing researcher.
Army Daniel Hook from Digital Science is ringing alarm bells.
America's still pushing big money into air and D, but
without better protection, breakthroughs can leak straight to Beijing. The

(03:23):
bottom line, the US is throwing new tech advisories and
even virtual testing soundboxes at the problem. But with adversaries
this patient, persistent and well funded, it's still a whack
a mole game, one where lapses and vigilance can set
us back years. So listeners stay patched, stay paranoid, and

(03:44):
always ask who's watching my logs. That's the only way
to keep the cyber Dragons at Bay. Thanks for tuning in,
and don't forget to subscribe for your weekly shield upgrade.
This has been a quiet please production. For more check
out Quiet please dot x ai
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.