All Episodes

September 5, 2025 4 mins
This is your Tech Shield: US vs China Updates podcast.

No fluff, straight to the pulse: This week in the wild world of US cyber defense versus China, the plot thickened faster than a zero-day exploit. I’m Ting—cyber sleuth, China watcher, and your virtual caffeine shot for all things hacking. So, let’s dive right into the digital trenches.

After last week’s global fireworks, US agencies cranked up awareness on Chinese state-sponsored groups like Salt Typhoon, Operator Panda, GhostEmperor, and RedMike. According to the new joint advisory from the National Security Agency and its international partners, these threat actors aren’t just fancy names—they’re actively tunneling through telecom, transportation, government, and even lodging systems. Most notably, the Salt Typhoon campaign got the spotlight, for being the most ambitious to date: China’s hackers reportedly compromised telecom networks, aiming to surveil pretty much everyone, not just the headliners like President Donald Trump and Vice President JD Vance, but also millions of regular folks. The FBI sent out warnings, but honestly, they admitted they couldn’t even alert all the affected parties. It’s the cyber equivalent of yelling into a hurricane.

For those who like a firewall with their coffee, new government advisories urged immediate patching of known vulnerabilities and stricter edge-device controls. The Cybersecurity and Infrastructure Security Agency (CISA) rolled out an OT asset visibility playbook, pushing critical infrastructure operators to map out everything—because you can’t defend what you don’t even know exists. Tenable’s snapshot emphasized bolstering OT, ICS, and IoT protections, radical log centralization, and not treating old bugs like vintage wine—patch ‘em now.

Meanwhile, the US government dropped some spicy news via a House report: Over $2.5 billion in Pentagon grants funded joint research with Chinese universities blacklisted for links to China’s defense industry. More than 1,400 papers birthed from these collabs between June 2023 and June 2025 raised eyebrows, especially when many topics involved AI, hypersonics, and semiconductors. The congressional committee’s fix? Ban defense grants to any project tangled up with China’s defense sector. As Under Secretary of Education Nicholas Kent put it, these findings reveal huge gaps in the way federally funded research is protected on US campuses.

Industry isn’t letting government have all the fun. Some US universities are rapidly shutting down joint programs with Chinese peers, especially where military relevance is sniffed out. Businesses too are being told, “You’re all in this DSP now”—that’s the Data Security Program, fresh from the DOJ. If you’re handling any data with even a whiff of international traffic, you better have your compliance game sharp, audits ready, and reporting systems tight. The grace period ended July 8, and the penalty hammer drops October 6.

As for emerging defensive tech, drone-mothership spectacles like China’s Jiu Tian and the Robot Wolf ground system have forced US strategists to rethink their love of drone “hellscapes”—turns out, China was more ready for unmanned warfare than expected. And despite US cyber tools still being sharp, as CSIS noted, the giant attack surface and hesitations in retaliatory policies make the system’s armor patchy at best.

To wrap up with some expert flavor: The new measures—patching, visibility, stricter partnerships—are all necessary steps. But until we bridge private-sector gaps, monitor research flows like hawks, and invest in next-gen detection for both hardware and human vulnerabilities, we’re mostly playing catch-up. The adversaries aren’t waiting. Neither should we.

Thanks for tuning in. Don’t forget to subscribe for the latest in cyber showdowns. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
No fluff, straight to the pulse. This week, in the
wild world of US cyber defense versus China, the plot
thickened faster than a zero day exploit. I'n ting cyber sleuth,
China Watcher, and your virtual caffeine shot for all things hacking.
So let's dive right into the digital trenches. After last

(00:20):
week's global fireworks, US agencies cranked up awareness on Chinese
state sponsored groups like Salt Typhoon, Operator Panda, Ghost Import,
and Red Mic. According to the new Joint Advisory from
the National Security Agency and its international partners, these threat
actors aren't just fancy names. They're actively tunneling through telecom, transportation, government,

(00:43):
and even lodging systems. Most notably, the Salt Typhoon campaign
got the spotlight for being the most ambitious to date.
China's hackers reportedly compromise telecom networks, aiming to surveil pretty
much everyone, not just the headline like President Donald Trump
and Vice President j D Vance, but also millions of

(01:05):
regular folks. The FBI sent out warnings, but honestly, they
admitted they couldn't even alert all the affected parties. It's
the cyber equivalent of yelling into a hurricane for those
who like a firewall with their coffee. New government advisories
urged immediate patching of known vulnerabilities and stricter edge device controls.

(01:26):
The Cybersecurity and Infrastructure Security Agency Systemy CAESAR rolled out
an ot asset visibility playbook, pushing critical infrastructure operators to
map out everything, because you can't defend what you don't
even know exists. Tenable's snapshot emphasized bolstering ot ic and
IoT protections, radical log centralization, and not treating old bugs

(01:50):
like vintage wine patch him now. Meanwhile, the US government
dropped some spicy news via a House report. Over two
dollars in five sense in Pentagon grants funded joint research
with Chinese universities blacklisted for links to China's defense industry.
More than one thousand, four hundred papers berthed from these

(02:11):
collabse between June twenty twenty three and June twenty twenty
five raised eyebrows, especially when many topics involved AI, hypersonics
and semiconductors. The Congressional Committee's fix ban defense grants to
any project tangled up with China's defense sector. As Under
Secretary of Education Nicholas Kent put it, these findings reveal

(02:34):
huge gaps in the way federally funded research is protected
on US campuses. Industry isn't letting government have all the fun.
Some US universities are rapidly shutting down joint programs with
Chinese peers, especially where military relevance is sniffed out. Businesses too,
are being told you're all in this DSP. Now that's

(02:56):
the data security program fresh from the DOJ. If you're
handling any data with even a whiff of international traffic,
you better have your compliance games sharp, audits ready, and
reporting systems tight. The grace period ended July eighth, and
the penalty hammer drops October sixth. As for emerging defensive tech,

(03:17):
drone mothership's spectacles like China's GTN and the robot Wolf
ground system have forced US strategists to rethink their love
of drone healscapes. Turns out China was more ready for
unmanned warfare than expected, and despite US cybertools still being sharp.
As csis noted, the giant attack surface and hesitations in

(03:38):
retaliatory policies make the system's armor patche at best. To
wrap up with some expert flavor. The new measures, patching visibility,
stricter partnerships are all necessary steps. But until we bridge
private hyphen sector gaps, monitor research flows like hawks, and
invest in next hyphen gen detection for both hard where

(04:00):
and human vulnerabilities, were mostly playing catch up. The adversaries
aren't waiting, neither should we. Thanks for tuning in. Don't
forget to subscribe for the latest in cyber showdowns. This
has been a quiet please production. For more check out
quiet please dot ai
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.