This is your Red Alert: China's Daily Cyber Moves podcast.
If you’re tuning in today, you already know: The cyber news feeds are lighting up like it’s Singles Day on Alibaba, and you’re listening to Ting—your favorite China cyber wonk with just enough snark to keep you awake. Here’s your Red Alert: what’s hot, not, and possibly on fire in Chinese cyber moves against US targets as of, yes, Friday, August 8, 2025.
Let’s skip pleasantries. The most critical activity right now? A brand new emergency directive from CISA—yes, an actual rare red-alert blast—demanding every federal agency patch a godawful Microsoft Exchange flaw, pronto. Microsoft quietly dropped the patch late Wednesday, right after bragging about becoming a $4 trillion company. According to ex-White House cyber advisor Roger Cressey—who, by the way, describes Microsoft as “a $4 trillion monster”—this Exchange flaw feels like leaving your digital front door wide open while broadcasting your security code on TikTok. Cressey’s blood pressure is higher than the Great Wall as he explains: Chinese actors are so familiar with these products that, in any future hostility, critical infrastructure is pretty much defenseless if these holes aren’t patched.
Here’s the timeline:
Wednesday night, Microsoft goes public with the new Exchange zero-day vulnerability, which is especially bad in hybrid setups where on-premises systems sync with Exchange Online. By Thursday morning, CISA issues a four-day order—patch or face digital doom. If you’re running an old hybrid setup, your authentication credentials could have already been hijacked and reused by, let’s call them, “Persons of Interest” in Shanghai.
It doesn’t end there. CISA’s post-mortem dug up malware on compromised SharePoint servers—DLLs, web shells, and even cryptographic key stealers. The forensic calls are coming from inside the house.
Meanwhile, NSA officials at Black Hat in Las Vegas just confirmed—yes, right from the stage—that Chinese-backed groups like Salt Typhoon (a.k.a. RedMike, Earth Lusca if you collect APT trading cards) aren’t just hunting top defense contractors anymore. They’re bowling over tiny suppliers no one thought Beijing would care about. This week alone, Canadian telecoms and US steel operators saw network traffic rerouted and sensitive data siphoned using unpatched Cisco vulnerabilities. Picture your grandma’s antique shop, suddenly on the PLA’s radar.
The escalation outlook isn’t pretty. If this attack vector stays open, coordinated strikes could cripple sectors—energy grids, air traffic, health records—before you’ve even swiped your badge at work Monday. The FAA and TSA, in a panic, are now demanding not just patched systems but full compliance with NIST-based cyber policies—think cybersecurity on steroids, from your unmanned drones to your domain controllers.
So what now? If you’re listening and you own, manage, or tinker with anything Microsoft in hybrid mode, patch it yesterday. Hunt deep for credential misuse, check logs for stealthy web shells, and assume compromise until proven otherwise. Push your partners, vendors, and yes, even your in-laws to do the same. CISA and the FBI want suspicious activity reported—don’t hesitate, just escalate.
And, as always, buckle up for more. The dragons are circling and the fireworks are just starting. Thanks for tuning in to my cyber-hued rants. Remember to subscribe, and if you want to stay ahead of the breach, you know where to find me. This has been a quiet please production, for more check out quiet please dot ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta