All Episodes

September 15, 2025 4 mins
This is your Tech Shield: US vs China Updates podcast.

Ting here, your friendly cyber sage—let’s get straight to the digital dogfight brewing between the United States and China this week, because it’s been a real firewall frenzy, and—spoiler alert—America’s cyber defenders have had their hands full. So buckle up, listeners!

Picture this: the Salt Typhoon campaign, a major Chinese APT (Advanced Persistent Threat) operation, keeps haunting US infrastructure. Salt Typhoon is no fly-by-night hacker crew; these patient operators have spent years burrowing into the very backbone of telecommunications, transportation, and government systems—across eighty countries, but with special attention to the domestic heavyweights like AT&T, Verizon, and T-Mobile. According to the FBI’s cyber division assistant director Brett Leatherman, this is a “national defense crisis” with attackers not just vacuuming up data, but living in the network for months before striking. It’s like if a spy moved into your Wi-Fi router, redecorated, and ate all your snacks.

Fast forward to the latest advisories: the US Cybersecurity and Infrastructure Security Agency has gone sirens-blazing, urging all defenders to audit historical DNS logs, patch known vulnerabilities, and deploy segmentation—don’t let yesterday’s digital ghosts linger. And yes, defenders, that means everyone should be hunting for the same sneaky Salt Typhoon footprints, because dormant compromised domains are now being mapped in real time.

While defenders wrestle Salt Typhoon, Washington has been busy on the legislative front. The House just advanced the Wimwig Act, aiming to replace the expiring Cybersecurity Information Sharing Act of 2015, which, let’s face it, was the duct tape holding threat intelligence sharing together for a decade. Wimwig clarifies liability, updates definitions for AI-fueled attacks, and mandates that small businesses get real threat briefings, not corporate jargon. Representative Andrew Garbarino called the law “urgent,” warning that even a month’s lapse could set back cyber defense worldwide—it’s that critical.

And if you thought hacking scandals were a Chinese export only, how about this juicy leak: over 500 gigabytes of Great Firewall of China documents got dumped online—source code, work logs, censorship playbooks, all from Geedge Networks and the famed “Father of the Firewall,” Fang Binxing, with help from MESA Lab. This is historic. The material doesn’t just illuminate how Beijing censors and surveils at home; it details global exports of this tech, showing nations from Myanmar to Pakistan buying deep packet inspection tools and lawful intercept systems from China. It’s the first draft of the global playbook for authoritarian net controls, and US experts are poring over it like it’s the Rosetta Stone—hoping for clues to spot exports, anticipate next-gen censorship, and maybe, just maybe, catch the bad actors before they breach the gates.

Industry, meanwhile, isn’t just admiring the problem. There’s a scramble to patch old vulnerabilities, a surge in zero-trust and real-time monitoring defenses, and, of course, pulling in AI to tip the scales against cyber mercenaries. But the expert consensus remains: while visibility is improving, these threats evolve fast, and persistent gaps—legacy systems, coordination delays, and privacy minefields—keep defenders awake at night. As Cynthia Kaiser, formerly of the FBI and now at Halcyon Security, put it, “We can’t protect if we don’t hear from you”—translation, folks, share those IOCs or risk standing alone.

And there you have it. From legislative trench warfare and espionage advisories, to firewall leaks and the race for defensive AI, the US-China cyber chessboard is in high gear. Thanks for tuning in—don’t forget to subscribe so you don’t miss next week’s byte-sized battle brief. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Ting here, your friendly cygasage. Let's get straight to the
digital dogfight brewing between the United States and China this week.
Because it's been a real firewall frenzy and spoiler alert,
America's cyber defenders have had their hands full, So buckle up, listeners.
Picture this the Salt Typhoon campaign, a major Chinese APT

(00:20):
advanced persistent threat operation keeps haunting US infrastructure. Salt Typhoon
is no fly by night hacker crew. These patient operators
have spent years borrowing into the very backbone of telecommunications, transportation,
and government systems across eighty countries, but with special attention
to the domestic heavyweights like AT and T, Verizon, and

(00:42):
T Mobile. According to the FBI's Cyberdivision Assistant Director Brett Leatherman,
this is a national defense crisis, with attackers not just
vacuuming up data, but living in the network for months
before striking. It's like if a spy moved into your
Wi Fi router, redecorated and eight all your snacks. Fast

(01:02):
forward to the latest advisories, the US Cybersecurity and Infrastructure
Security Agency has gone sirens blazing, urging all defenders to
audit historical DNS locks, patch known vulnerabilities, and deploy segmentation.
Don't let yesterday's digital ghosts linger and yes, defenders, that

(01:23):
means everyone should be hunting for the same sneaky Salt
Typhoon footprints because dormant compromised domains are now being mapped
in real time while defenders wrestle Salt Typhoon. Washington has
been busy on the legislative front. The House just advanced
the Windwig Act, aiming to replace the expiring Cyber Security
Information Sharing Act of twenty fifteen, which, let's face it

(01:47):
was the duct tape holding threat intelligence sharing together for
a decade. Wimwig clarifies liability, updates definitions for AI fueled attacks,
and mandates that small businesses get real threats, not corporate jargon.
Representative Andrew Garbarino called the law urgent, warning that even
a month's lapse could set back cyber defense worldwide. It's

(02:10):
that critical. And if you thought hacking scandals were a
Chinese export only, how about this juicy leak. Over five
hundred gigabytes of Great Firewall of China documents got dumped online,
source code, worklogs, censorship playbooks, all from GEDG networks and
the famed father of the firewar, Thang Binching, with help

(02:31):
from MESA Lab. This is historic. The material doesn't just
illuminate how Beijing sensors and surveils at home. It details
global exports of this tech, showing nations from Miaan Mahar
to Pakistan buying deep packet inspection tools and lawful intercept
systems from China. It's the first draft of the global
playbook for authoritarian net controls, and US experts are pouring

(02:54):
over it like it's the Rosetta Stan hoping for clues
to spot exports, anticipate net exgen censorship, and maybe just
maybe catch the bad actors before they breach the gates. Industry, meanwhile,
isn't just admiring the problem. There's a scramble to patch
old vulnerabilities, a surge and zero trust and real time
monitoring defenses, and of course pulling in AI to tip

(03:18):
the scales against cyber mercenaries. But the expert consensus remains.
While visibility is improving, these threats evolve fast and persistent
gaps legacy systems, coordination delays, and privacy minefields keep defenders
awake at night. As Cynthia Kaiser, formerly of the FBI
and now at Halcyon Security, put it, we can't protect

(03:41):
if we don't hear from you. Translation, Folks, share those
IOCs or risks standing alone, and there you have it.
From legislative trench warfare and espionage advisories to firewall leaks
and the race for defense of AI, the US China
cyber chess board is in high gear. Thanks for tuning in.

(04:02):
Don't forget to subscribe so you don't miss next week's
bite sized battle brief. This has been a quiet please production.
For more check out Quiet Please dot AI
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.