All Episodes

August 31, 2025 3 mins
This is your Tech Shield: US vs China Updates podcast.

Hey listeners, it’s Ting, your not-so-humble guru on all things China, Cyber, and Code—coming at you with this week’s latest from the great cyber chessboard: Tech Shield, US versus China edition. Buckle up, because if you thought August was sleepy, think again. The cyber world’s been pinging louder than my VPN on a slow Starbucks Wi-Fi.

Let’s start with the fresh-from-the-fire headlines. US officials are busier than ever, with the FBI revealing the Salt Typhoon attacks against telecoms were way bigger than anyone thought. This isn’t just script kiddie nonsense—this is industrial-scale snooping with serious national security teeth. Chinese advanced persistent threat groups, aka APTs, are at the heart of multiple new espionage campaigns. Western governments—including our own—have gone almost public in shaming Beijing, pressing for better intelligence-sharing between agencies and with private players. If cybersecurity is a cat-and-mouse game, the mice just got fancier traps.

Speaking of traps, CISA just dropped two brand-new industrial control system advisories. That’s right, they’re patching up software in everything from power plants to your local water utility, and let’s be honest, nobody wants the lights or the tap water controlled by someone in Shenzhen. The real kicker? A joint threat hunt from CISA and the US Coast Guard at a critical infrastructure site found plenty of cyber hygiene bugs—think expired certificates, legacy passwords, and more hidden holes than a Swiss cheese router. The message from CISA: patch fast or get pwned.

On top of those reactive moves, the US is getting proactive, too. CISA, teaming up with Sandia National Labs, has rolled out Thorium—a shiny new automation platform to turbocharge analysis of incoming malware. It’s like caffeine for cyber defenders, letting small teams handle seas of suspicious files. Microsoft’s bounty programs keep growing—a staggering $17 million paid out to volunteer bug-hunters worldwide. These white hats are now a core part of our cyber immune system, patching thousands of vulnerabilities before Beijing’s best even wake up.

Industry isn’t sitting idle, either. Def Con projects are spinning up free open-source tools for smaller, underfunded water utilities—a sector that, by the way, has been especially exposed after recent attacks on Europe’s water systems. Meanwhile, the Federal Aviation Administration is demanding stronger cyber standards for drones and unmanned aircraft, since no one wants UAVs doing Beijing’s bidding by remote.

Here’s the million-renminbi question: Is all this enough? Listen, cyber-defense isn’t about flipping a switch; it’s about whack-a-mole, but with smarter moles every month. Cross-functional teamwork is still a hot mess—IT guys over here, OT engineers over there, everyone pointing at each other when things pop off. Asset maps look good on PowerPoint, but attackers are moving faster, especially with AI in the mix. Persistent gaps remain: incomplete operational visibility, weak data flow control, and too much focus on ‘shiny’ new tech over basic cyber hygiene.

Expert verdict? Progress, yes—but the arms race is getting faster and messier. The hope is with relentless patching, smarter automation, and tighter collaboration, the US can stay one lucky step ahead. But as one wise CISO put it, the attackers only need to be lucky once—defenders have to be lucky every time.

Listeners, that’s the week’s cyber frontline—Tech Shield: US vs China. Don’t forget to patch early, test often, and never click suspicious links, unless you want me crawling your inbox next week. Thanks for tuning in, don’t forget to subscribe, and keep your cyber shields up.

This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Hey listeners, it's ting you're not so humble Goo on
all things China, cyber and code coming at you with
this week's latest from the Great Cyber Chessboard, tech Shield
US Versus China Edition. Buckle up, because if you thought
August was sleepy, think again. The cyber world's been pinging
louder than my VPN on a slow Starbucks WiFi. Let's

(00:22):
start with the fresh from the fire headlines. US officials
are busier than ever, with the FBI revealing the Salt
typhoon attacks against telecoms were way bigger than anyone thought.
This isn't just script kiddy nonsense. This is industrial scale
snooping with serious national security teeth. Chinese Advanced persistent threat
groups akaapts are at the heart of multiple new espionage campaigns.

(00:46):
Western governments, including our own, have gone almost public in
shaming Beijing, pressing for better intelligence sharing between agencies and
with private players. If cybersecurity is a cat and mouse game,
the the mice just got fancier traps. Speaking of traps,
sizages drop two brand new industrial control system advisories. That's right,

(01:09):
they're patching up software in everything from power plants to
your local water utility, and let's be honest, nobody wants
the lights or the tap water controlled by someone in Shanjing,
the real kicker. A joint threat hunt from SEASI and
the US Coast Guard at a critical infrastructure site found
plenty of cyber hygiene bugs. Think expired certificates, legacy passwords,

(01:31):
and more hidden holes than a Swiss cheese router. The
message from seaside, patch fast or get pooned. On top
of those reactive moves, the US is getting proactive too. SEASI,
teaming up with Sandia National Labs, has rolled out Thorium,
a shiny new automation platform to turbo charge analysis of
incoming malware. It's like caffeine for cyber defenders, letting small

(01:55):
teams handle seas of suspicious files. Microsoft's bounty programs keep growing,
a staggering seventeen million dollars paid out to volunteer bug
hunters worldwide. These white hats are now a core part
of our cyber immune system, patching thousands of vulnerabilities before
Beijing's best. Even wake up industry isn't sitting idle either.

(02:16):
Defcon projects are spinning up free, open source tools for smaller,
underfunded water utilities, a sector that, by the way, has
been especially exposed after recent attacks on Europe's water systems. Meanwhile, meanwhile,
the Federal Aviation Administration is demanding stronger cyber standards for
drones and unmanned aircraft since no one wants UAVSE doing

(02:37):
Meijing's bidding by remote. Here's the million remnant be question.
Is all this enough? Listen? Cyber defense isn't about flipping
a switch. It's about whack a mole, but with smarter
moles every month. Cross functional teamwork is still a hot ness.
It guys over here, ot engineers over there, everyone pointing
at each other when things pop off. Asset maps look

(02:59):
good on powerpoints, but attackers are moving faster, especially with
AI in the mix. Persistent gaps remain incomplete operational visibility,
weak data flow control, and too much focus on shiny
new tech over basic cyber hygiene. Expert verdict, Progress yes,
but the arms race is getting faster and messier. The

(03:20):
hope is with relentless patching, smarter automation, and tighter collaboration,
the US can stay one lucky step ahead. But as
one why Cazo put it, the attackers only need to
be lucky once, defenders have to be lucky every time. Listeners,
that's the week's cyber front line text shield US versus China.

(03:40):
Don't forget to patch early, test often, and never click
suspicious links unless you want me crawling your inbox next week.
Thanks for tuning in, don't forget to subscribe, and keep
your cyber shields up. This has been a quiet please production.
For more check out quiet please dot ai
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.