All Episodes

September 14, 2025 4 mins
This is your Tech Shield: US vs China Updates podcast.

Hey listeners, Ting here—and let’s get right to the juicy bits, because this week in Tech Shield: US vs China, the cyber chessboard absolutely lit up, and the stakes are higher than a Shanghai rooftop.

Right out of the gate, the most jaw-dropping news: On September 11, the Great Firewall of China—yes, the very fortress of censorship architected by Fang Binxing and run by Geedge Networks—sprang a leak the size of the South China Sea. Over 500 gigabytes of code, logs, and chillingly detailed blueprints for digital control, dumped online for all to see. The leak is a goldmine, and not just for researchers. Adversaries and freedom hackers worldwide are dissecting everything from deep packet inspection tricks to real-time traffic analysis engines. Imagine if the Death Star plans got airdropped into every rebel base—that’s what just happened in cyberland. Even more concerning, the leak exposes how Geedge’s censorship tech is getting exported, with custom modules for regimes from Myanmar to Kazakhstan. This is digital authoritarianism with global ambitions.

But while Beijing scrambles, the US is hustling on the defense. The FBI issued a flash alert about two China-linked hacker groups—UNC6040 and UNC6395—laser-targeting Salesforce platforms to siphon off data from government and industry. Now, if you deal with Salesforce, check the FBI’s latest indicators of compromise—these attacks use different access tricks, and the tempo is up. Meanwhile, U.S. trade officials received direct warnings from the House Select Committee on China about ongoing cyber espionage campaigns tied to the People’s Republic. Targets? Anyone in the crosshairs of those tense U.S.-China trade negotiations—think policymakers, diplomats, and plenty of U.S. business leaders.

On the patch front, it’s been a rapid-fire volley. Samsung rushed out an emergency fix for a zero-day exploited in Android—CVE-2025-21043—after hackers started using it for arbitrary code execution. Microsoft’s security team, not to be outdone, dropped patches for 80 vulnerabilities, including a couple of real hair-raisers: an SMB privilege escalation flaw and an Azure bug sporting a perfect CVSS 10.0. CISA issued an emergency directive for agencies to lock down Microsoft Exchange’s hybrid setups. All this underscores one point: Defense is a living, breathing task—never static.

New tools are coming to the frontline too. The Pentagon’s prepping a shift to zero-trust architectures—translation: misuse one credential, and the system won’t simply roll out the welcome mat anymore. Plus, new “Mission Network-as-a-Service” plans aim to unify military IT fabrics, so a scramble response is way faster, and partner-sharing is slicker when the chips are down.

What do the pros say? Experts from Wired and the cybersecurity corners of Reddit point out two things: First, the Great Firewall leak could catalyze the next generation of circumvention tech—better VPNs and obfuscation—but it could also hand cybercriminals statebackdoor schematics, so expect cat-and-mouse games to intensify. Second, the US patch-and-alert machine is nimble, but with Chinese APTs deploying stealthy, fileless malware frameworks like EggStreme, the offensive game remains strong. These tools inject malicious code straight into memory—leaving barely a fingerprint. So even with increased investment, the US cyber perimeter is anything but impenetrable.

Room for improvement? Yes. The gap still yawns at the intersection of supply chain security, cloud technologies, and post-patch monitoring. And the spread of censorship tools globally means this fight isn’t just about breach-and-defend, but about the shape of internet freedom itself.

Thanks for tuning in, cyber diehards. For more cutting-edge updates, don’t forget to subscribe. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Hey, listeners, ting here and let's get right to the
juicy bits, because this week in tech shield Us versus China,
the cyber chess board absolutely lit up and the stakes
are higher than a Shanghai rooftop right out of the gate.
The most jaw dropping news on September eleventh the Great
Firewall of China, Yes, the very fortress of censorship, architected

(00:22):
by Fung Bing Singh and run by GEDG Networks sprang
a leak the size of the South China Sea, over
five hundred gigabytes of code logs and chillingly detailed blueprints
for digital control dumped online for all to see. The
leak is a gold mine, and not just for researchers.
Adversaries and freedom hackers worldwide are dissecting everything from deep

(00:44):
packet inspection tricks to real time traffic analysis engines. Imagine
if the death style plans got air dropped into every
rebel base. That's what just happened in Cyberland. Even more concerning,
the leak exposes how Geege's sensor ship tech is getting
exported with custom modules for regimes from Me and Mar
to Kazakhstan. This is digital authoritarianism with global ambitions. But

(01:11):
while Beaijing scrambles, the US is hustling on the defense.
The FBI issued a flash alert about two China link
tacker groups UNC six zero four zero and UNC six
three nine five laser targeting Salesforce platforms to siphon off
data from government and industry. Now, if you deal with Salesforce,

(01:32):
check the FBI's latest indicators of compromise. These attacks use
different access tricks, and the tempo is up. Meanwhile, US
trade officials received direct warnings from the House Select Committee
on China about ongoing cyber espionage campaigns tied to the
People's Republic targets. Anyone in the crosshairs of those tense

(01:53):
US China trade negotiations, think policymakers, diplomats, and plenty of
US business leaders. On the patch front, it's been a
rapid fire volley. Samsung rushed out an emergency fix for
a zero day exploited in Android Dash CVE DASH two
zero two five DASH twenty one thousand, forty three after

(02:14):
hackers started using it for arbitrary code execution. Microsoft security team,
not to be outdone, dropped patches for eighty vulnerabilities, including
a couple of real hair raisers, an SMB privilege escalation floor,
and an Azure bug sporting a perfect CVSS ten point zero.
SISSA issued an emergency directive for agencies to lock down

(02:37):
Microsoft Exchanges hybrid set ups. All this underscores one point
defense is a living, breathing task, never static. New tools
are coming to the front line too. The Pentagon's prepping
a shift to zero trust architectures. Translation misuse one credential
and the system won't simply roll out the welcome mat anymore. Plus,

(03:00):
new Mission Network as a Service plans aim to unify
military IT fabrics, so a scramble response is way faster
and partner sharing is slicker when the chips are down.
What do the pros say? Experts from Wired in the
cybersecurity corners of Reddit point out two things. First, the
Great Firewall leak could catalyze the next generation of circumvention tech,

(03:22):
better VPNs and obfuscation, but it could also hand cyber
criminal's state back door schematics, so expect cat and mouse
games to intensify. Second, the US patron alert machine is nimble,
but with Chinese apts deploying stealthy fireless malware, frameworks like Eggstreme,
the offensive game remains strong. These tools inject malicious codes

(03:43):
straight into memory, leaving barely a fingerprint, so even with
increased investment, the US cyber parimeter is anything but impenetrable.
Room for improvement. Yes, the gap still yawns at the
intersection of supply chain security, cloud technologies, and post patch monitoring,
and the spread of censorship tools globally means this fight

(04:05):
isn't just about breach and defend, but about the shape
of Internet freedom itself. Thanks for tuning in cyber Diards
for more cutting edge updates. Don't forget to subscribe. This
has been a quiet please production. For more check out
quiet please dot ai
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.