This is your US-China CyberPulse: Defense Updates podcast.
Listeners, welcome to US-China CyberPulse: Defense Updates with me, Ting! Strap in, because if you thought the world of cross-Pacific cyber games was wild in 2024, this past week proves 2025 is the year the stakes—and the firewalls—are bigger than ever.
Let’s get straight to the latest front: Washington is tightening the screws on AI chip exports, especially those juicy Nvidia processors everyone’s fighting over. Chinese firms have been sidestepping earlier bans by rerouting shipments through Southeast Asia. According to Bloomberg and Malaysia’s own Trade Minister, the US is now targeting Malaysia and Thailand with new licensing requirements, aiming to shut down these indirect chip “leaks.” No more hand-carrying drives full of neural-network dreams across borders! Not only is this about hardware, it’s about who gets to train the next generation of AI super-brains. The message from Washington: your AI isn’t getting an American accent any time soon.
Of course, defense isn’t just about hardware. The big cyber block for this week is the Department of Justice’s new Data Security Program—the DSP. Starting July 9, the DOJ is done being patient: all companies must be rock-solid compliant with strict rules about exporting US sensitive data, especially to so-called “countries of concern”—translation: China, among others. The grace period for getting your act together is over. Now, if you’re caught sending data where it shouldn’t go, expect the National Security Division to come knocking, and it won’t be with a fruit basket, folks.
Meanwhile, the private sector is rallying around the Cybersecurity Information Sharing Act, or CISA. A heavy-hitting coalition featuring Google, Microsoft, Intel, and big security platforms like HackerOne is pressuring Congress to extend this law before it expires in October. They argue it’s the legal backbone for rapid, no-fear threat intelligence sharing—which is vital when Hafnium or the newly surfaced Silk Typhoon are launching mass-hacks. Without CISA, companies might zip their lips on vulnerabilities, leaving the door wide open for exploitation.
And boy, are the threats still coming. The Justice Department just confirmed the arrest of Xu Zewei, an alleged contract hacker for the Chinese government, in Italy. He’s accused of mass-hacking Microsoft Exchange servers and stealing COVID-19 research. His colleague Zhang Yu remains at large—and with sophisticated groups like Hafnium and Silk Typhoon switching up tactics, the chase is far from over.
On the global stage, the tension is dialed up to eleven. China’s Ministry of State Security publicly accused the US of wide-scale cyber espionage, claiming American hackers are targeting Chinese infrastructure and sensitive sectors. The digital finger-pointing is amplifying pressure on international diplomacy and adding fuel to the US push for resilience—not just against soft and hard power threats, but the everyday cyber sabotage that could knock out airports or water systems in a heartbeat.
That’s why cutting-edge defense now means investing in quantum-resistant cryptography before quantum computers break all the locks, beefing up critical infrastructure, and keeping alliances sharp from Silicon Valley to ASEAN. As both sides play for global tech dominance, staying a step ahead is about relentless innovation, airtight cooperation, and not letting your guard down for even a nanosecond.
That’s the CyberPulse for this week. Thanks for tuning in—don’t forget to subscribe, and remember: defense is a team game, and this team’s only getting stronger. This has been a quiet please production, for more check out quiet please dot ai.
For more http://www.quietplease.ai
Get the best deals