All Episodes

August 22, 2025 4 mins
This is your Tech Shield: US vs China Updates podcast.

If you’re tuning in from home, work, or a suspicious café flooded with free Wi-Fi, hey there, I’m Ting – your specialist in China, cyber, and staying one byte ahead of international threat intel.

No fluffy intros today – let’s jump straight into the week’s biggest flashpoints from Tech Shield: US vs China. First up, the continuing fallout from China’s admission to U.S. officials about Volt Typhoon. According to the Defense Counterintelligence and Security Agency’s David Cattler, China isn’t just investing in tanks and jets, they’re running a global espionage campaign that targets our supply chains, intellectual property, and even our workforce. For listeners marking their calendar, add Salt Typhoon to your threat bingo: another Chinese operation blitzing our telecommunications giants. And for the drama addicts, remember that Treasury Department vendor breach from December last year? Over 3,000 files, some connected to Janet Yellen herself. All courtesy of Chinese hackers, who probably didn’t even break a sweat.

Now, defensive moves. The Cybersecurity and Infrastructure Security Agency, or CISA if you’re into acronyms, dropped an emergency directive for federal agencies to scrub a fresh Microsoft Exchange vulnerability. Federal IT pros spent this week knee-deep in patching hybrid configurations and plugging every conceivable data leak. Industry was quick to follow: Fortune 100 defense contractors are clocking around 65,000 phishing attempts a month – imagine playing whack-a-mole with malware, but the moles never get tired.

Meanwhile, the Trump Administration’s AI Action Plan is in full swing. Released July 23, the plan is all about winning the artificial intelligence race. It calls for AI to be secure-by-design, with systems able to sniff out suspicious performance shifts and automatically signal when someone’s trying to poison the data well. They also launched the AI Information Sharing and Analysis Center (AI-ISAC), aiming to connect critical infrastructure players so they’re not flying solo when the next zero-day pops up.

Expert commentary? CrowdStrike says Murky Panda – also known as Silk Typhoon and formerly Hafnium – is pushing the boundaries by exploiting internet-facing appliances and cloud trust relationships. There’s a new strain called CloudedHope, delivered via web shells, and the initial infection often comes through well-known vulnerabilities like Citrix NetScaler or Commvault. These groups are fast, inventive, and not afraid to target mom-and-pop office routers sitting quietly on U.S. soil.

Government advisories are coming thick and fast. The FBI and international partners publicly tied the Salt Typhoon campaign to Chinese hackers, catalyzing a huge surge in investment: cybersecurity spending is on track to top $212 billion in 2025. The insurance sector is nervy too – premiums will double by 2027, because nobody wants to hold the bag on a national-scale ransomware attack.

Emerging defense tech trends? Open RAN, folks. The U.S. government is urging worldwide adoption, pitching it as the antidote to Huawei’s all-you-can-eat network bundles. Open RAN makes telecoms more democratic, harder to backdoor, and fuels a private-public alliance that China’s subsidized gear simply can’t match.

So, is everything patched, locked down, and future-proofed? Not yet. David Cattler warns the threat landscape is active and adaptive, evolving faster than policy sometimes changes its socks. AI can detect and respond to breaches, but gaps persist around supply chain visibility and election infrastructure. The cyber contest is far from over, and staying in front means patching, sharing threat intel, upgrading insurance – and yes, maybe a little luck.

Thanks for tuning in! Don’t forget to subscribe for your weekly dose of digital derring-do. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
If you're tuning in from home, work, or a suspicious
cafe flooded with free WiFi. Hey there, I'm ting you're
specialist in China cyber and staying one bite ahead of
international thret intel. No fluffy intros today, let's jump straight
into the week's biggest flash points from tech shield US
versus China. First up, the continuing fallout from China's admission

(00:20):
to YEARS officials about Vault Typhoon. According to the Defense
Counterintelligence and Security Agencies David Kettler, China isn't just investing
in tanks and jets. They're running a global espionage campaign
that tartets our supply chains, intellectual property, and even our workforce.
For listeners marking their calendar, add Salt Typhoon to your

(00:42):
threat bingo. Another Chinese operation blitzing are telecommunications giants. And
for the drama addicts, remember that Treasury Department vendor breach
from December last year. Over three thousand files, some connected
to Janet Yellen herself, all courtesy of Chinese hackers who
probably didn't even break a sweat. Now, defensive moves the

(01:05):
Cyber Security and Infrastructure Security Agency or SEESA. If you're
into acronyms dropped an emergency directive for federal agencies to
scrub a fresh Microsoft Exchange vulnerability. Federal it pro to
spent this week knee deep in patching hybrid configurations and
plaguing every conceivable data leak. Industry was quick to follow.

(01:27):
Fortune one hundred defense contractors are clocking around sixty five
thousand phishing attempts a month. Imagine playing whack a mole
with malware, but the moles never get tired. Meanwhile, the
Trump Administration's AI Action Plan is in full swing, release
July twenty third. The plan is all about winning the
artificial intelligence race. It calls for AI to be secure

(01:49):
by design, with systems able to sniff out suspicious performance
shifts and automatically signal when someone's trying to poison the
data well. They also launched the a UI Information Sharing
and Analysis Center AI dash ISAC aiming to connect critical
infrastructure players so they're not flying solo when the next
zero day pops up. Expert commentary CrowdStrike says murky Panda,

(02:15):
also known as silk Typhoon and formony Hafnium, is pushing
the boundaries by exploiting Internet facing appliances and cowed trust relationships.
There's a new strain called clouded hope, delivered via webshells,
and the initial infection often comes through well known vulnerabilities
like Citrix Netscala, or Convolt. These groups are fast, inventive,

(02:39):
and not afraid to target mum and pop office routers
sitting quietly on US soil. Government advisories are coming thick
and fast. The FBI and International Partners publicly tied the
Salt Typhoon campaign to Chinese hackers, catalyzing a huge surge
in investment. Cybersecurity spending is on track to top two

(03:02):
hundred and twelve billion dollars in twenty twenty five. The
insurance sector is nervy. Two premiums will double by twenty
twenty seven because nobody wants to hold the bag on
a national scale ransomware attack. Emerging defense tech trends Open
ran folks. The US government is urging worldwide adoption, pitching

(03:24):
it as the antidote to huaweis or you can eat
network bundles. Open Iran makes telecoms more democratic, harder to backdoor,
and fuels a private public alliance that China subsidize gear
simply can't match. So is everything patched, locked down and
future proofed. Not yet. David Kettler warns the threat landscape

(03:46):
is active and adaptive, evolving faster than policy sometimes changes
its socks AI can detect and respond to breaches, but
gaps persist around supply chain, visibility and election infrastructure. The
cyber contest is far from over, and staying in front
means patching, sharing threat intel, upgrading, insurance, and yes, maybe

(04:09):
a little luck. Thanks for tuning in. Don't forget to
subscribe for your weekly dose of digital daring. Do This
has been a quiet please production for more check out
quiet please dot ai
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.