Tech Shield: US vs China Updates

China's Cyber Blockade While Running 18K Hacking Servers: The Audacity is Unmatched


Listen Later

This is your Tech Shield: US vs China Updates podcast.

Hey listeners, Ting here. Let's talk about what's been happening in the cyber trenches between the US and China this week, because honestly, it's been absolutely wild.

So China just made a power move that caught everyone's attention. According to Reuters reporting from January 15th, Beijing ordered domestic companies to stop using cybersecurity software from over a dozen US and Israeli firms, citing national security risks. Basically, they're saying your Cisco, your Palo Alto, your Western security tools? Not welcome here anymore. The irony is pretty thick considering what we're about to discuss.

Speaking of which, the Pentagon and Cisco Talos have been tracking some seriously concerning activity. A China-linked threat group called UAT-8837 has been targeting North American critical infrastructure since at least last year. These folks are nasty, and they're getting results. But here's where it gets interesting: Cisco actually fixed a critical AsyncOS vulnerability tracked as CVE-2025-20393 with a perfect 10.0 severity score. This flaw was already being exploited in the wild by another Chinese APT group, UAT-9686. So the defensive tech community is scrambling, but they're responding.

Now, the Chinese aren't just poking at infrastructure. According to Acronis, a threat group called Mustang Panda recently ran a phishing campaign using Venezuela-themed emails as bait. They're targeting US government and policy-related entities with malware that can do remote tasking and data exfiltration. The campaign leveraged current geopolitical events as lures, which frankly shows sophistication in their social engineering approach.

What's particularly spicy is that according to Hunt.io's analysis, China is hosting over eighteen thousand active command and control servers across forty-eight infrastructure providers. China Unicom alone hosts nearly half of these. That's industrial scale malware infrastructure right there.

On the defensive side, the US CISA added a Microsoft Windows vulnerability to its Known Exploited Vulnerabilities catalog this week. The government is clearly working overtime identifying and tracking exploitable weaknesses before adversaries weaponize them further.

The bigger picture here is that China's openly developing quantum-based cyberwarfare weapons, according to the National University of Defense Technology. They've allocated fifteen billion dollars in public funding and they're testing over ten experimental quantum cyberwarfare systems. Meanwhile, Western defenders are still patching traditional vulnerabilities.

The gap is real, listeners. We're playing whack-a-mole with zero-days while our adversaries are thinking about quantum dominance. But at least we're responding faster than we used to.

Thanks for tuning in. Make sure to subscribe for more updates on this ongoing cyber showdown. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
...more
View all episodesView all episodes
Download on the App Store

Tech Shield: US vs China UpdatesBy Inception Point Ai