This is your Tech Shield: US vs China Updates podcast.
If you’re tuning in from home, work, or a suspicious café flooded with free Wi-Fi, hey there, I’m Ting – your specialist in China, cyber, and staying one byte ahead of international threat intel.
No fluffy intros today – let’s jump straight into the week’s biggest flashpoints from Tech Shield: US vs China. First up, the continuing fallout from China’s admission to U.S. officials about Volt Typhoon. According to the Defense Counterintelligence and Security Agency’s David Cattler, China isn’t just investing in tanks and jets, they’re running a global espionage campaign that targets our supply chains, intellectual property, and even our workforce. For listeners marking their calendar, add Salt Typhoon to your threat bingo: another Chinese operation blitzing our telecommunications giants. And for the drama addicts, remember that Treasury Department vendor breach from December last year? Over 3,000 files, some connected to Janet Yellen herself. All courtesy of Chinese hackers, who probably didn’t even break a sweat.
Now, defensive moves. The Cybersecurity and Infrastructure Security Agency, or CISA if you’re into acronyms, dropped an emergency directive for federal agencies to scrub a fresh Microsoft Exchange vulnerability. Federal IT pros spent this week knee-deep in patching hybrid configurations and plugging every conceivable data leak. Industry was quick to follow: Fortune 100 defense contractors are clocking around 65,000 phishing attempts a month – imagine playing whack-a-mole with malware, but the moles never get tired.
Meanwhile, the Trump Administration’s AI Action Plan is in full swing. Released July 23, the plan is all about winning the artificial intelligence race. It calls for AI to be secure-by-design, with systems able to sniff out suspicious performance shifts and automatically signal when someone’s trying to poison the data well. They also launched the AI Information Sharing and Analysis Center (AI-ISAC), aiming to connect critical infrastructure players so they’re not flying solo when the next zero-day pops up.
Expert commentary? CrowdStrike says Murky Panda – also known as Silk Typhoon and formerly Hafnium – is pushing the boundaries by exploiting internet-facing appliances and cloud trust relationships. There’s a new strain called CloudedHope, delivered via web shells, and the initial infection often comes through well-known vulnerabilities like Citrix NetScaler or Commvault. These groups are fast, inventive, and not afraid to target mom-and-pop office routers sitting quietly on U.S. soil.
Government advisories are coming thick and fast. The FBI and international partners publicly tied the Salt Typhoon campaign to Chinese hackers, catalyzing a huge surge in investment: cybersecurity spending is on track to top $212 billion in 2025. The insurance sector is nervy too – premiums will double by 2027, because nobody wants to hold the bag on a national-scale ransomware attack.
Emerging defense tech trends? Open RAN, folks. The U.S. government is urging worldwide adoption, pitching it as the antidote to Huawei’s all-you-can-eat network bundles. Open RAN makes telecoms more democratic, harder to backdoor, and fuels a private-public alliance that China’s subsidized gear simply can’t match.
So, is everything patched, locked down, and future-proofed? Not yet. David Cattler warns the threat landscape is active and adaptive, evolving faster than policy sometimes changes its socks. AI can detect and respond to breaches, but gaps persist around supply chain visibility and election infrastructure. The cyber contest is far from over, and staying in front means patching, sharing threat intel, upgrading insurance – and yes, maybe a little luck.
Thanks for tuning in! Don’t forget to subscribe for your weekly dose of digital derring-do. This has been a quiet please production,...