Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/51/2b/97/512b9730-9bdd-80d7-4399-6131aec152e2/mza_2079604229688464795.jpg/600x600bb.jpg
China Hack Report: Daily US Tech Defense
Inception Point Ai
146 episodes
7 hours ago
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
RSS
All content for China Hack Report: Daily US Tech Defense is the property of Inception Point Ai and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
Episodes (20/146)
China Hack Report: Daily US Tech Defense
Grandmas router banned, PlugX slims down, and AI jets lure spies - oh my! China cyber tea, piping hot
This is your China Hack Report: Daily US Tech Defense podcast.

Today is November 2nd, 2025, and you’re plugged into the cyber trenches with me, Ting, your friendly neighborhood China cyberwatcher! Buckle up, because the past 24 hours have been a blizzard of digital drama—packed with new malware, warnings, emergency patches, and even router bans that’d make your grandma’s TP-Link quake.

Let’s start with the most urgent news: the Department of Commerce, along with Defense and Homeland Security, is considering a total ban on TP-Link Wi-Fi routers in the U.S. after a recent inter-agency risk review flagged ongoing concerns about Chinese government influence over TP-Link’s American operations. Those routers, which anchor up to 65% of U.S. homes, might soon be in regulatory purgatory. For now, CISA and DHS both say: update your router firmware, nuke default passwords, and turn off remote management. These are your three-minute defensive actions—do them before your next coffee run, not after.

Now malware. Over in the Windows Wild West, state-backed outfit UNC6384—yes, the Mustang Panda siblings—have been caught using a Windows shortcut exploit, CVE-2025-9491, to drop PlugX malware on diplomatic targets. The new hotness: shrunken PlugX payloads and ultra-stealthy deploy methods. Arctic Wolf found that the CanonStager loader dropped from a chonky 700 kilobytes to just 4 KB by last month, making it basically invisible to legacy defense tools. Microsoft confirms that Smart App Control and Defender will spot the attack chain, but only if you patch and don’t click random “EU coordination” invites. Social engineering plus PowerShell trickery equals diplomatic disaster.

Meanwhile, CISA just added fresh pain to its Known Exploited Vulnerabilities catalog. XWiki’s CVE-2025-24893 and VMware Aria’s CVE-2025-41244 are now seeing live attacks—get those patches installed now. CISA isn’t mincing words: attackers are moving faster than your IT department, so if you manage or use those platforms, patch or face uninvited guests.

In nation-state espionage, Ribbon Communications just discovered that a 10-month-long breach, likely China-linked, exposed client communications for government and Fortune 500 targets. This is proof, yet again, that threat actors are getting better at hiding—moving laterally and lurking under the radar for months before blowing cover.

In sector news, U.S. defense contractors—especially those dabbling in next-gen drone tech like Anduril’s YFQ-44A—remain red-hot targets. The debut of that autonomous AI fighter jet just three days ago was trumpeted as a win for U.S. innovation, but it’s also a glittering beacon for cyberespionage crews from China to Moscow. Spear-phishing around related defense programs is up, with CISA warning compliance teams to double scrutinize file shares and access requests tied to unmanned systems.

Lastly, officials in Manila warned yesterday about a credible threat of DDoS attacks targeting public web infrastructure this coming week, a pattern that often foreshadows or overlaps with more sophisticated attacks elsewhere—so SOC teams, stay caffeinated and keep incident response scripts handy.

Thanks for tuning in to China Hack Report: Daily US Tech Defense. Make sure to subscribe for your daily dose of what’s lurking behind the Great Firewall. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
7 hours ago
4 minutes

China Hack Report: Daily US Tech Defense
China's Cyber Tricks & Treats: VMware, Telco Hacks Spook US Tech on Halloween 2025
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, I’m Ting, your go-to for the juiciest cyber scoops, especially when China’s in the mix. Today’s Halloween, October 31, 2025, but trust me: the real scares are in cyber, not haunted houses. Let’s jump right into the latest hacks, malware frights, and official CISA alerts hitting US tech and defense over the past 24 hours—no spooky stories, just hard-hitting reality.

First, the showstopper: the just-uncovered VMware Tools and VMware Aria Operations vulnerability—CVE-2025-41244—has been in active exploitation by Chinese state hackers, specifically the group known as UNC5174, for nearly a year. This flaw lets any user with basic access to a virtual machine break out and seize root control. Think of it as someone sneaking into your locked guest room and suddenly having the keys to your whole house. CISA rushed out an emergency directive yesterday and put this flaw at the top of its Known Exploited Vulnerabilities catalog. If you’re running affected VMware, patch now or disconnect from the network—seriously, don’t wait to become the next headline. The deadline for federal agencies is November 20, but private orgs: you are not immune. The group behind these attacks, UNC5174, works as a contractor for China’s Ministry of State Security and is also linked to breaches at US defense and telecom giants earlier this year. Maxime Thiebaut from NVISO first found the bug, confirming it’s not just theoretical—full proof of concept code is floating around, and attacks are ongoing according to both CISA and the Google Mandiant team.

But wait—it's not just virtualization platforms dripping in risk. Auburn University’s McCrary Institute and Microsoft both confirm that China’s “Typhoon” hacking umbrella—think Volt Typhoon, Salt Typhoon, Linen Typhoon, and more—is probing and, in many cases, deeply embedded within critical US infrastructure. That means energy, water, telecom, transportation, and healthcare. The Salt Typhoon crew, for instance, breached Verizon, AT&T, and Charter, snarfing up metadata for a million US users, including government officials, and even getting views into lawful intercept data that law enforcement uses. It’s almost a Netflix show: code names, sector-hopping, and a relentless drive for disruption.

Telecommunications are in the crosshairs, with Ribbon Communications reporting a likely China-backed breach—customer files on laptops were accessed. They’re tight-lipped on technical specifics, but say the snooping may have started way back in December 2024. Response involved federal law enforcement and third-party cyber firepower, but it’s a sober reminder: attackers are patient, persistent, and sometimes invisible until it’s too late.

On the wider stage, Chinese-linked group UNC6384—closely related to Mustang Panda—has been busy in Europe, targeting diplomatic networks with spear phishing and the classic PlugX rat. While not a US direct hit, their methodology and tooling often cross the pond, so defenders should take note: social engineering and Linked malware campaigns are evergreen.

Your defense plan for today, according to CISA: patch all VMware Aria and Tools installs now, verify your segmentation on critical infrastructure networks, audit logs for unusual authentication, and educate staff against social engineering—especially in sectors at highest risk. The US is fighting back with indictments, advisories, and sanctions, but the game is endurance.

So that’s your cyber threat rundown for this Halloween. Don’t forget to subscribe, stay patched, and stay paranoid—in a good way! Thanks for tuning in, and this has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals Show more...
2 days ago
4 minutes

China Hack Report: Daily US Tech Defense
China's Cyber Shenanigans: WSUS Woes, Salt Typhoon Strikes, and Qilin's Rampage!
This is your China Hack Report: Daily US Tech Defense podcast.

This is Ting, coming at you with another China Hack Report: Daily US Tech Defense, and tonight’s theme is breakneck escalation. Let’s skip the appetizer and carve right into what mattered most for US cyber defense and why nobody in SecOps got much sleep last night.

First up, if you have anything running Microsoft WSUS, pay attention. Researchers at Gurucul and HackerNews confirmed that CVE-2025-59287—yeah, that’s a 9.8 on the “scream and unplug it” scale—continues to get hammered. Even after getting its so-called Patch Tuesday bandaid, attackers linked with China and Eastern Europe have been exploiting exposed servers with remote code execution, escalating privileges, and in some cases, taking over entire update infrastructures. CISA pushed this flaw straight to its Known Exploited Vulnerabilities Catalog, telling everyone with legacy WSUS deployments or lazy patch habits to update, now, or suffer the déjà vu of standing up a new network from scratch.

But WSUS isn’t the only thing in hot water. Salt Typhoon—a group with ties to China, also known as Earth Estries—was spotted by Darktrace hitting a European telecom using an old Citrix NetScaler exploit, the same one published over the summer. Why should you care, listeners? Because their post-exploitation hooks showed up in an American university’s logs yesterday, seriously suggesting reconnaissance or even lateral movement on US soil. The playbook is classic: find one weak link, pivot, harvest credentials, and exfiltrate. Salt Typhoon isn’t just targeting Europe anymore—the scope is clearly global, and US research or telecom orgs should consider themselves on high alert.

On the supply chain front, the Qilin ransomware crew, while not strictly Beijing-backed, remains a global headache and their toolsets overlap with “Premier Pass-as-a-Service” operations. Gurucul reports that Qilin keeps up its pace at over 40 breaches a month, with CISA warning manufacturers and scientific facilities to review segmentation, offline backups, and to track anything using Cyberduck or lateral spreading via PsExec.

What about policy? China’s Cyberspace Administration is prepping some of the world’s stiffest incident reporting mandates for its own operators and infrastructure, but here’s the kicker—US lawmakers and the FCC responded by tightening bans and scrutiny on nine Chinese telecom entities this week, which, as reported by Security Boulevard, means any device even whispering “manufactured in Beijing” is now on the blacklist.

Yesterday saw Cobalt Strike beacons lit up from a mainland China IP, targeting port 8888, a classic precursor to wider command-and-control operations. Meanwhile, Delmia Apriso, key in manufacturing ops, made CISA’s alert list after reports of exploitation targeting its platform—if you’re tracking critical infrastructure, watch those dashboards.

Immediate action check: patch WSUS again, validate Citrix and SharePoint hardening, and hunt for suspicious Cyberduck activity or Cobalt Strike signatures. CISA’s bulletins for late October urge layered defense, rapid vulnerability scanning, and all-hands phishing simulation.

That’s it for today’s China Hack Report. Thanks for tuning in, catch me tomorrow, and don’t forget to subscribe! This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
4 days ago
3 minutes

China Hack Report: Daily US Tech Defense
Microsoft's Patch Panic: China's Cyber Tag-Team Strikes Again!
This is your China Hack Report: Daily US Tech Defense podcast.

Hello listeners, Ting here, your go-to for China Hack Report: Daily US Tech Defense—diving headfirst into the past 24 hours where digits met drama and national security had another sleepless night.

Let’s cut straight to what set keyboards clacking: Microsoft’s emergency patch. If you work with Windows Server Update Services, listen up! Microsoft just confirmed active exploitation of a devastating remote code execution flaw—CVSS 9.8, brutal even by hacker standards. This is CVE-2025-59287, and it lets attackers turn legitimate Windows updates into sneaky malware delivery—think “trusted system update” morphing into stealthy sabotage. Microsoft pushed a fix on October 23, 2025, and the Cybersecurity and Infrastructure Security Agency (CISA) shouted an all-out alert for every U.S. agency and company running WSUS: patch now, reboot, and validate every system. CISA was explicit—servers without the new patch could let attackers poison entire enterprise networks. If you haven’t patched yet, stop multitasking and do it. Seriously.

But the drama doesn’t end there. Over the last day, Trend Research dropped a bombshell about new “Premier Pass-as-a-Service” tactics among China-aligned advanced persistent threat groups, chiefly Earth Estries and Earth Naga—also known in the cool kids’ club as Flax Typhoon or RedJuliett. These groups are not just hacking separately anymore. Instead, they’re sharing compromised network access—like one group breaking in, then handing over the virtual keys to another, who moves in for the data loot. It’s next-level coordination, and it’s been seen across government and telecom sectors, even hitting major retail organizations. Earth Estries deployed its CrowDoor backdoor for stealth, then Earth Naga swept in with the notorious ShadowPad malware. Both toolkits have been part of real, confirmed attacks from late 2024 through mid-2025, but the ramifications for U.S. critical infrastructure and supply chains are only piling up.

Now, phishing is an old game, but the massive “Smishing Triad” campaign reported by Palo Alto Networks’ Unit 42 takes it global. Attackers ran over 194,000 malicious domains, many with traces back to Chinese infrastructure, distributing SMS phishing messages imitating everything from government agencies to parcel carriers. The domains reset and respawn so rapidly, security teams struggle to blacklist them before your HR gets that fateful “urgent tax notice” text.

Ransomware didn’t take the weekend off: On October 26, the Play ransomware crew hit Metal Pros, a big U.S. manufacturing player, and threatened a leak unless paid. The list of recommendations from response pros is a must-do—incident reviews, encrypted backups, threat intel integration, and your best friend: multi-factor authentication.

Big picture: national strategy and CISA's work are being stretched to the limit, as covered in the latest FDD cyber report. Ongoing call-outs urge Congress to stabilize cybersecurity funding and staff, noting without it, adversaries won’t feel the pain, while U.S. companies bear the brunt. Tech diplomacy, too, is now squarely on the table—clear as day that Chinese state-linked hackers are raising their game globally.

Thanks for tuning in—remember to subscribe so no cyber shadow can catch you napping. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
6 days ago
3 minutes

China Hack Report: Daily US Tech Defense
Spicy Cyber Gossip: China Hacks Routers, Cracks Citrix and SharePoint, Feds Sweat Taiwan Tensions
This is your China Hack Report: Daily US Tech Defense podcast.

This is Ting, tuning in with your rapid-fire rundown of the nastiest China-linked cyber moves lighting up U.S. tech defense in the past twenty-four hours. Hold onto your passwords, because today’s menu is mega spicy.

Leading off, let’s talk “Salt Typhoon.” That phrase probably makes infrastructure execs break out in hives. CISA Director Jen Easterly called out Salt Typhoon yet again—yes, those China-backed spies are still lurking inside U.S. telecommunications networks. Even after half a year digging, the Feds haven't evicted them. It isn’t just a spy game anymore. The real aim? In Jen’s words, they want ability to disrupt or destroy, in case things get serious over Taiwan. We’re talking attacks on pipelines, water supplies, transport, comms—the very basics of American routines. This is about causing chaos, not just stealing those inflation numbers from the Fed’s laptop.

Volt Typhoon is another name echoing around threat briefings, and this crew is burrowing into Fortigate security devices—think of them as the locked doors on important digital buildings. Their favorite exploits? Vulnerabilities like CVE-2022-40684, which was theoretically patched out of existence, but apparently these guys keep wriggling through cracks. Also on the Fortigate hit list: F5 BIG-IP devices, already bleeding from a breach that exposed over 262,000 systems globally. Yikes.

Chinese group BlackTech isn’t letting up either, actively manipulating router firmware to avoid detection, which is like reprogramming your actual locks so only the hackers have the new key. NSA and CISA together blasted out a warning to check your router firmware for suspicious modifications. That’s your cue: asset owners and IT shops, go confirm you’re running official firmware or brace for long nights ahead.

In fresh technical pain, Security Affairs reported that Salt Typhoon is leveraging new exploits for Citrix NetScaler and SharePoint. The latter—ToolShell vulnerability CVE-2025-53770—was already patched by Microsoft in July, yet attackers pounced right after, breaching telecom companies in the Middle East. Clearly, “patched” doesn’t equal “protected.” Emergency patch tip: If you’re running Oracle, Windows, Kentico, or Apple gear, CISA has shoved new flaws into its Known Exploited Vulnerabilities catalog, with Oracle’s CVE-2025-61884 topping the panic index. Get those patches in now.

New malware? Cobalt Strike beacons have pinged from servers in Hangzhou, China, with fresh detections rolling in literally hours ago, courtesy of RedPacket Security. If you’re seeing post-intrusion lateral movement and command-and-control traffic, don’t brush it off.

CISA’s immediate defensive moves: verify router firmware integrity, slam those new patches home, and beware of trusted files or devices suddenly acting untrustworthy. Threat intel teams are stressing out about network edge devices—especially routers, firewalls, and any always-online thingamabob with an outdated SNMP or REST API.

So, cyber-defenders, you’ve got updates to deploy, logs to comb, and firmware to double-check. That’s your mission before the next wave. Thanks for tuning in to China Hack Report: Daily US Tech Defense. Remember to subscribe so you’re never caught flat-footed. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 week ago
3 minutes

China Hack Report: Daily US Tech Defense
Motex, XenWare, and Smishing, Oh My! China Hacks Ramp Up as US Defenses Scramble
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here, your friendly neighborhood China cyber whisperer, and what a whirlwind day for American tech defenses. So, toss aside your VPN and grab your digital Hazmat suit, because October 24th has been a wild ride on the China Hack Report—let’s get right into the code soup.

First, headline of the hour: US critical infrastructure just dodged another bullet, thanks to a nasty Motex Lanscope Endpoint Manager bug. CISA flagged this vulnerability after active exploitation attempts surfaced, and let me tell you, hackers—yes, those with Mandarin keyboards—have wasted no time. While Motex isn’t exactly a household name outside IT departments, these endpoint managers are goldmines for lateral movement once breached. SC Media reported CISA’s immediate advice: patch Motex systems now or, as they put it, risk “business-impacting compromise.” And if you’re still running old versions, treat every device as suspect until reviewed.

Not to be outdone, a new wave of ransomware is rocking the industrial sector—AI-generated and China-linked. Enter XenWare, the love child of LockBit and ChatGPT, but meaner and about six times faster. Trellix’s October cyberthreat report spotlights XenWare’s multithreading approach: encrypts everything, everywhere, before most admins can even yell “cyber incident!” US industrial targets are taking the brunt, and AI isn’t just making malware faster, it’s also making old-school phishing terrifyingly effective.

Speaking of phishing, the infamous Smishing Triad—think Ocean’s Eleven with SIM cards—has expanded operations, with over 194,000 malicious domains lighting up American cell towers since January. Unit 42 at Palo Alto Networks explained how these scammers imitate the USPS, banks, brokerage logins, and now—brace yourself—even government sites. The secret sauce? Most of their domains only live a few days, making blocklists look like rotary phones. Financial fallout: north of $1 billion globally in the last three years, and US brokerage accounts are the fresh favorite for “ramp and dump” stock price manipulation.

Meanwhile, Adobe Experience Manager and Oracle E-Business Suite are both on CISA’s bad list after proof of active exploitation emerged this week. The AEM flaw scored a perfect 10 on CVSS—which, if you didn’t know, is like being selected last for dodgeball, but much more catastrophic. Patch both ASAP; no exceptions, no holidays.

And in the cyber-geopolitics ring, China’s Foreign Ministry is in full-on finger-pointing mode—accusing the US of aggressive infrastructure attacks, while US authorities push back, still citing Volt Typhoon and related “transnational” activities. All that diplomatic huffing aside, back at the server rack, the action is relentless.

So, what should you do right now? Update, patch, and audit like your bonus depends on it. Deploy endpoint security updates on Motex, Adobe, and Oracle products immediately. Be extra skeptical of text and email links—especially urgent delivery or bank requests. And for SOCs everywhere, it’s time to re-tune AI detection; these new malware strains outpace legacy scans.

That’s all for today’s China Hack Report: Daily US Tech Defense. I’m Ting, keeping you savvy, secure, and just a bit snarky. Thanks for tuning in—remember to subscribe for your daily byte. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 week ago
4 minutes

China Hack Report: Daily US Tech Defense
China's Hacker Underworld Strikes Again: F5, SharePoint, and Telecom Takedowns
This is your China Hack Report: Daily US Tech Defense podcast.

I’m Ting, your cyber-wit on the pulse of China’s hacker underground. This past 24 hours—let’s just say, if you’re in US tech defense, your sleep schedule’s about as secure as an unpatched router on election night.

Let’s kick off with F5’s breach, lighting up the boards like it’s DEF CON and the badge contest is rigged. The nation-state group UNC5221, with ties to China according to Bloomberg and the Google Threat Intelligence Group, camped inside F5’s network for months, deploying their custom BRICKSTORM malware. They exfiltrated BIG-IP source code and configuration data—think infrastructure blueprints—and gave themselves a buffet of zero-days. While F5 says the breach is contained, the U.S. Cybersecurity and Infrastructure Security Agency, CISA, isn’t popping champagne. They hit federal agencies with emergency directive ED 26-01: inventory all F5 products, yank public access to management interfaces, and patch like the wind. Deadline for full compliance? October 29. Miss it and you’ll have more meetings than the Internals group at the NSA. CrowdStrike and Mandiant are circling like sharks to lock down the perimeter.

Meanwhile, Microsoft SharePoint’s ToolShell vulnerability, CVE-2025-53770, is being devoured by a buffet of China-linked threat actors—Budworm, Sheathminer, and Storm-2603, with Symantec confirming Salt Typhoon is all over it. University networks in the US got pwned, and finance, telco, and even government agencies across four continents fell to webshells, credential dumping, and creative side-loading moves utilizing legitimate security software. These attackers dropped the Go-based Zingdoor backdoor, ShadowPad Trojan, and RustyLoader to plant persistent, command-and-control frameworks on compromised systems. Microsoft’s fix is out—patch *now* or risk finding a Chinese APT in your org chart.

For today’s malware hall of fame, meet SnappyBee. Volt Typhoon, aka Salt Typhoon, breached a European telecom with this custom backdoor, leveraging a Citrix NetScaler zero-day, sneaking past antivirus with signed drivers, and stealing metadata and lawful intercept data. If you’re in telecom—especially here in the States—James Azar at CyberHub Podcast says treat network traffic analytics like your last bottle of Sriracha: handle with care and keep it close. CISA adds new exploits for Apple, Microsoft (CVE-2025-33073, the SMB client flaw), and Kentico to the Known Exploited Vulnerabilities list. Apple patched their bug back in 2022, but everyone’s got some aunt convinced updates are the enemy. Those unpatched iPhones—guess who’s test-driving Chinese malware?

Oracle has a new October update, dropping a whopping 374 patches. CISA flagged Oracle’s CVE-2025-61884, a server-side request forgery flaw in E-Business Suite, and mandated government agencies apply patches by November 10. If your Oracle stack isn’t up-to-date, you might as well run it on a Raspberry Pi taped to a drone headed for Beijing.

Emergency defense actions per CISA and cyber experts:

Audit Citrix NetScaler configs for SnappyBee indicators.

Patch Windows SMB (CVE-2025-33073), Kentico CMS, Apple Core, Adobe AEM Forms (CVE-2025-54253), and Oracle E-Business Suite (CVE-2025-61884) immediately.

Monitor for abnormal network traffic, credential dumps, and unauthorized admin logins.

If it uses open-source keys, reissue and revoke now. Over 120,000 Bitcoin wallets exposed last night—yup, that includes you, crypto bros.

Every sector is a target: government, law enforcement, universities, finance, telecoms, the supply chain. The PRC’s Salt Typhoon drove what Sen. Mark Warner calls the worst telecom hack in US history; stolen call logs, wiretap orders, and election materials underscore the urgency of these defenses.

Thanks for tuning in! Subscribe so you get each daily update...
Show more...
1 week ago
4 minutes

China Hack Report: Daily US Tech Defense
Cyber Insomnia: F5 Breached, Salt Typhoon Strikes, and China vs NSA Showdown
This is your China Hack Report: Daily US Tech Defense podcast.

Welcome, cyber sleuths and insomniac infosec fans—Ting here with a charged update on the wildest 24 hours in US tech defense. If you thought your coffee was strong, wait for this cyber brew. At the very top of today’s “can’t-ignore-it” incident list is the F5 Networks breach. You’ve got to love when classic networking kit becomes the theatrical stage for nation-state mayhem. Over 266,000 F5 BIG-IP devices are exposed globally, with the US accounting for the lion’s share, according to the Shadowserver Foundation. The attack exploited a zero-day authentication bypass in a favorite US infrastructure staple, and, surprise-surprise, fingers point squarely at Chinese state-sponsored actors. Cue the dramatic music: CISA didn’t just recommend patching—Emergency Directive ED 26-01 actually commanded all federal agencies and infrastructure operators to apply patches for F5OS, BIG-IP TMOS, and those other tongue-twister F5 products by October 22. If you see your sysadmin chain-chugging Red Bulls, it’s not allergies; it’s F5 patch day.

Here’s the twist: Bloomberg revealed the threat actors had been lurking in F5’s own environment since late 2023 and only got detected eight months later. Talk about overstaying your welcome. The attackers swiped source code and vulnerability data, giving them the potential to craft tailored malware—think digital lockpicks specifically for mission-critical operations. Time to re-audit your perimeter, folks.

Hot on those digital heels, Salt Typhoon—better known in the western halls of cyber as Earth Estries and UNC2286—sparked concern after they flung their latest malware arsenal at a European telco. The attack chain reads like a hacker’s favorite recipe: Citrix NetScaler Gateway exploited for initial access, followed by DLL sideloading through trusted antivirus tools like Norton and Bkav, and then moving laterally to hijack more network jewels. While this was a European flare-up, CISA and the FBI have repeatedly flagged Salt Typhoon for prior attacks on US telecommunications, broadband, and even wiretap infrastructure, snatching up call records and intercepting sensitive government communications.

And if you want a taste of today’s geopolitical spice, China’s Ministry of State Security accused the US National Security Agency of a cyber assault on their National Time Service Center, rolling out ‘42 specialized cyberattack weapons’ in what sounds like Clue, if Professor Plum carried zero-days instead of a candlestick. Beijing claims this could’ve jeopardized not just their timing networks, but also communications and financial systems, even hinting at potential disruptions across the power grid and space missions. The US, in textbook fashion, sidestepped specifics and reminded everyone that China remains, in their words, “the most active and persistent cyber threat” to US interests. Back-and-forth volleys aside, these allegations keep security teams on both continents on full alert.

On the home defense front, CISA’s must-do list starts with those F5 patches. They want all critical sectors to double-down on endpoint monitoring, restrict external-facing admin panels, and step up incident response rehearsals. If you’re a CISO, now is not the time to skip threat hunting. Mandiant and Google are echoing the call, particularly for telecom and finance sectors—patch tirelessly, scan for unusual DLL loads, and audit privileged account activity.

That’s the news sprint for today—devices breached, spyware unleashed, accusations flying faster than zero-days. Thanks for tuning in to China Hack Report: Daily US Tech Defense. Don’t forget to subscribe for your daily adrenaline shot of cyber mayhem. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai

Show more...
1 week ago
4 minutes

China Hack Report: Daily US Tech Defense
Ooh, China's Cyber Snoopers Caught Red-Handed in F5, Cisco Hacks! Patch Now or Prepare for Spying
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here with today's China Hack Report—your digital defense wingman in the never-ending cyber dogfight between Beijing and Washington. Strap in, because the last 24 hours have unleashed some jaw-dropping developments that’ll make even the most seasoned sysadmins clutch their coffee.

Let’s start with the bombshell that landed Wednesday: Chinese state-backed hackers were burrowed inside F5’s networks for nearly two years. That’s not just unfortunate, it’s catastrophic, seeing as F5's BIG-IP platform props up 85% of Fortune 500 companies and countless federal systems. Bloomberg revealed the adversaries basically turned F5’s own software into a revolving door; an employee oversight left a digital window wide open, and the attackers made themselves comfy, snatching source code, config files, and—most critically—secret vulnerability reports. Once inside, they deployed stealthy malware dubbed Brickstorm, quietly infecting VMware virtual machines and deeper infrastructure while lying dormant for twelve months. Not exactly the kind of “persistence” you want on your resume.

F5 didn’t realize the extent of the situation until August 2025, triggering an all-hands-on-deck response from CEO Francois Locoh-Donou, Google’s Mandiant, and CrowdStrike. CISA called the whole affair a “significant cyber threat targeting federal networks” and issued an emergency directive: if you’ve got F5 gear online, patch or disconnect before October 22—or risk waving at the PLA through a backdoor. The UK’s National Cyber Security Centre amplified the alert, warning attackers might piggyback on the F5 breach to find fresh vulnerabilities across the sector.

And while US agencies scramble for patches, Senator Bill Cassidy fired off a formal warning to Cisco over critical vulnerabilities affecting their network infrastructure, referencing active exploits tied to—wait for it—China, Russia, and Iran. Cassidy’s grilling Cisco CEO Chuck Robbins about patching strategies and how customers can keep up, especially since nearly half of US firms still don’t have a Chief Information Security Officer. CISA isn’t pulling punches—disconnect or update at once, with Citrix and Cisco appliances also flagged for live exploitation.

On the malware front, Mandiant confirmed Brickstorm was the weapon of choice inside F5, and CISA has added related exploits to its Known Exploited Vulnerabilities catalog. At the tactical level, threat actors are leveraging public exploit code for everything from F5’s config exposure to upload/download proxy bugs in Cisco gear. If you’re a defender, now’s the time to brush up on your threat hunting guides and tighten log retention—those attackers are known to wait out your deletion cycles.

Meanwhile, China has gone on the offensive diplomatically, with its Ministry of State Security accusing the US NSA of hacking the National Time Service Center in Xi’an. The claim is they’ve got “irrefutable evidence” of US espionage targeting China’s precision timing infrastructure—a foundation for GPS, communications, and satellite ops. Beijing says the NSA used 42 flavors of custom cyber weapons plus pilfered credentials to sneak past internal controls, but so far, their public evidence is mostly geopolitical fireworks.

Immediate defense steps? CISA wants every federal org running F5 patched ASAP and recommends organizations audit for Brickstorm indicators, bolster access control, and review log-deletion policies. Cisco, Citrix, and VMware admins—look alive, patch everything, and chase your vendors for the latest security bulletins.

That’s it for today’s China Hack Report. If you want to keep your digital fortress standing, follow the advisories, subscribe for daily updates, and remember: the only way to hack it in cyber is to never get hacked. Thanks for tuning in—don’t forget to subscribe. This...
Show more...
2 weeks ago
4 minutes

China Hack Report: Daily US Tech Defense
China's Cyber Heist: F5's Code Cracked, Feds Freak Out!
This is your China Hack Report: Daily US Tech Defense podcast.

This is Ting, your cyber-wit in chief, checking in with the absolute hottest intel from the last 24 hours. So, get comfy—I’ve got the story on China-linked cyber chaos and the emergency moves rocking the U.S. tech defense world.

First up, picture a five-alarm fire at F5 Networks, an American cybersecurity giant. F5’s engineers stumbled onto something ugly: someone—well, let’s get real, Bloomberg says it’s almost certainly state-backed hackers from China—snuck into F5’s internal development systems and helped themselves to pieces of BIG-IP source code, as well as docs packed with juicy, undisclosed vulnerabilities. That’s the same BIG-IP powering critical network infrastructure everywhere, not just tech companies but government agencies too. F5’s CEO François Locoh-Donou has been personally briefing customers, trying to keep panic from exploding, but it’s hard to chill when you realize the attackers were lurking in their systems for nearly a year.

What really makes this week’s breach wild isn’t only scale—it’s the national security response. CISA’s Acting Director Madhu Gottumukkala called it “alarming,” and the agency dropped a rare Emergency Directive, ED 26-01. Federal teams must hunt down every F5 BIG-IP, F5OS, BIG-IQ, and BNK/CNF device exposed on the internet and patch them, stat, by October 22nd, per F5’s latest “Quarterly Security Notification.” Any org running F5 gear, federal or not, got the same urgent warning—patch now or risk catastrophic compromise.

Let’s talk malware: out of this breach, F5’s threat-hunting team dropped a new guide focused on malware called Brickstorm. This sneaky little program has roots in attacks linked to Chinese APT groups, and it’s remarkable for how it leverages stolen development blueprints to facilitate future hacking. The guide is being passed around like flu shots on a Monday at the CDC—and is an instant must-read for every IT security boss.

What sectors are sweating most? Anyone using F5 is in the blast radius, but government, finance, and healthcare are especially jittery, given their reliance on F5 tech to shield sensitive data. Zscaler’s researchers, including Atinderpal Singh and Deepen Desai, laid out how this breach hands bad actors an operational roadmap, enabling them to weaponize zero-day vulnerabilities at breakneck speed. Expect a surge in attempts to exploit newly discovered flaws, and not just by China-linked players—nation-state cyber espionage is expanding, with moves toward NGOs and academia as Microsoft’s Digital Defense Report highlights.

Defensive moves? Besides racing to install emergency patches, CISA and F5 have tossed out the “zero trust” playbook: minimize device exposure, slice your networks into microsegments, lock down access controls by default, and review every configuration like you’re prepping for a presidential debate.

And don’t get distracted by headlines—while the F5 drama unfolds, OpenAI just dropped findings showing attackers are actively trying to bend ChatGPT and other LLMs to refine their hacks. The world of AI social engineering is here and growing—expect attack sophistication to keep ramping up.

So listeners, lock down your networks, talk to your IT folks, and hit those patches now. Is your organization still running F5? Be extra paranoid. Thanks for tuning in to China Hack Report—remember to subscribe for your daily dose of defense, and keep those cyber shields up. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
2 weeks ago
4 minutes

China Hack Report: Daily US Tech Defense
Ting's Tea: China's Cyber Smackdown Continues - F5 Fracas, Malware Mayhem, and Sizzling Sectors Under Siege
This is your China Hack Report: Daily US Tech Defense podcast.

Hey everyone, it’s Ting. If there’s a word to sum up the last 24 hours on the China cyber front, it’s “reload.” Pull up a chair and your favorite cold brew, because the hits keep coming, and the drama is as thick as Beijing smog. I’ll take you through the latest moves, the malware, the sectors under fire, and what you should do right now.

Let’s start with the F5 Networks fiasco—

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
2 weeks ago

China Hack Report: Daily US Tech Defense
Chinese Cyber Shenanigans Galore: BRICKSTORM, SharePoint Hacks, and Record-Smashing Botnets Unleashed!
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here—your go-to for truth bombs about China-linked cyber shenanigans! There’s no way around it: the past 24 hours in US tech defense have been absolutely turbocharged, so let’s jack in.

First up, let’s talk about the headline-grabber: the ongoing BRICKSTORM espionage campaign, as spotlighted by Google’s Threat Intelligence and Mandiant teams. This isn’t your typical “script kiddies in hoodies” stuff. UNC5221, a top-tier Chinese APT actor, is laying down highly stealthy backdoors, targeting US tech giants and law firms. This malware’s superpower? Staying invisible—these intruders have lingered in enterprise systems on average for nearly 400 days before anyone even smells something fishy. And the goal is bigger than grabbing source code—they’re after zero-day vulnerabilities, laying groundwork for much broader access, possibly for strategic disruption if tensions with China ratchet up. Legal, SaaS, and core tech sectors: you’re in the crosshairs, my friends.

But the plot thickens. Remember July’s SharePoint hack? That disaster is still echoing through the cyber halls of power. After three Chinese threat groups—Linen Typhoon, Violet Typhoon, and Storm-2603—exploited three nasty zero-days after Microsoft’s confidential notifications, more than 400 organizations, including the US National Nuclear Security Administration, found themselves on the wrong end of a multi-stage attack. The kicker: the attackers sidestepped both initial and post-patch protections, keeping their foothold even after Microsoft dropped emergency updates. CISA has been all over this, urging everyone to apply every available SharePoint patch, enable the Anti-malware Scan Interface, rotate your ASP.NET keys, and scan logs for weird POST requests to "/_layouts/15/ToolPane.aspx". And if your SharePoint server’s end-of-life—or you suspect it’s compromised—get it off the internet now.

Across sectors, things are getting uncomfortably real. Oracle just threw a five-alarm fire with CVE-2025-61884—a critical, unauthenticated remote code execution vulnerability in E-Business Suite. No login needed, just point and exploit. Oracle urges immediate patching, because if you’re running EBS 12.2.3 through 12.2.14, you could lose sensitive internal data, or worse, give an intruder a golden ticket to your entire network. These kinds of ERP attacks are a feast for nation-state hackers who want a shortcut to America’s business underbelly.

There’s also been a flurry of Cobalt Strike beacon traffic flagged on multiple US servers today—a sure tell that either preliminary access is being brokered or command-and-control persistence is being set up for future incursions.

Meanwhile, Gladinet file-sharing servers are under siege by a zero-day, with no patch yet in sight. Since attackers can steal cryptographic keys and execute code, the immediate ask from security pros is to apply temporary mitigation steps, disconnect public-facing servers, and monitor for illicit API traffic.

The botnet Aisuru, born in Asia but now powered by US-based hijacked IoT, just broke DDoS records—showing China-linked actors are colonizing our own infrastructure for their attacks. If you haven’t isolated those smart fridges, get a move on.

Finally, in the past day, CISA issued a new warning on a fresh Windows local privilege escalation bug. Patch immediately, restrict unnecessary admin rights, and scrutinize all accounts logging in from abroad.

Key takeaways: patch fast, check logs, rotate keys, and if your public-facing servers aren’t absolutely mission-critical, get them off the internet or behind strong access controls. China’s cyber playbook is evolving, so your defense has to keep up.

Thanks for tuning in—don’t forget to subscribe for your daily shot of cyber reality from Ting. This has been a quiet please...
Show more...
2 weeks ago
4 minutes

China Hack Report: Daily US Tech Defense
Beamglea Campaign, Stealit Malware, and Aisuru Botnet: Beijings Triple Threat in US Cyberattacks
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here—welcome back to your favorite tech defense briefing on China Hack Report: Daily US Tech Defense for October 12, 2025. Let’s skip the pleasantries because things have been sizzling in the last 24 hours. If you blinked, you missed something hacked.

Top of the threat list: the **Beamglea Campaign**, which ramped up just yesterday. Chinese cybercriminals abused 175 compromised npm packages and the unpkg CDN for a large-scale phishing spree. These attacks are leveraging cloud-based infrastructure that US startups and Fortune 500 companies trust for deploying web apps. The technique: embed phishing malware in innocent-looking packages that developers download, turning legitimate code into a Trojan horse. This one’s spreading fast, so dev teams, audit every dependency now and check for indicators of compromise—CISA's emergency bulletin spells it out, plus recommends kill-switches and immediate network segmentation for any suspected system.

Over in the world of **malware**, US security pros are racing to counter the fresh variant of Stealit malware, which piggybacks off game and VPN installers. This stealthy beast abuses Node.js's single executable feature, which means it can sneak onto endpoints almost as easily as adding a browser extension. Stealit’s recent wave managed to siphon login credentials from three major US tech firms—one in fintech, one in communications, and another we can’t name (yet). Sophos and Mandiant are ringing the alarm, advising a full sweep for malicious installers and a lockdown on third-party software—even your games aren’t safe.

The **DDoS botnet Aisuru** just set new records striking US ISPs—AT&T, Verizon, and Comcast took the brunt. Nearly 30 trillion bits per second slammed into US infrastructure, traced to compromised IoT devices like smart cameras and routers. This is no random flood; experts say Chinese operators likely orchestrated the botnet’s surge to test domestic resilience. If you run an ISP or host consumer devices, patch everything and isolate infected segments. CISA’s guidance pushes for disabling unused ports and rolling out network-level anomaly detection, pronto.

CISA’s also urging hospitals and biotech to tighten ship after fresh disclosure of Chinese-made medical monitors carrying a backdoor. The FDA and American Hospital Association back this up. At least one common monitor used in US clinics can download unauthorized code remotely—meaning someone in Shenzhen could tweak your ECG with a few keystrokes. Hospitals: apply the recommended firmware patch and isolate these devices to their own VLAN with zero internet access. Biotech firms, heads up: the Senate just advanced the Biosecure Act, aiming to cut federal contracts with Chinese genetic tech suppliers. Anyone in genomics or medical research, reevaluate partnerships immediately.

And last but not least, the **velociraptor tool**—meant for digital forensics—was hijacked by a China-linked crew dubbed Storm-2603. They deployed ransomware via the same DFIR tool US security teams use for incident response. Irony alert: defenders get hacked with their own shield. The immediate fix is restricting tool access and enforcing stricter privilege boundaries on forensics software.

So what’s my take? China’s cyber game is a mix of speed, scale, and a penchant for infiltrating the very tools we rely on for defense. CISA, under Nick Anderson and with leadership changes pending, is laser-focused on protecting operational tech and critical infrastructure. Their action plan is clear: assess exposure, patch fast, restrict everything, and keep scanning. Whether you’re running a data center, a hospital, or just a fancy smart fridge, tighten up—because Beijing does not sleep.

Thanks for tuning in and listening to Ting rant and report. Don’t forget to subscribe for the latest...
Show more...
3 weeks ago
4 minutes

China Hack Report: Daily US Tech Defense
Ting's Tea: China's Cyber Stunts, GPUGate Malware, and Patching Panic!
This is your China Hack Report: Daily US Tech Defense podcast.

Hey there, tech enthusiasts It's Ting here, and let's dive into the latest China-linked cyber activities affecting US interests. The past 24 hours have been wild, so buckle up!

Chinese hackers have been getting bolder, and just yesterday, they breached a major U.S. law firm using a zero-day exploit. Chris Riotta from BankInfoSecurity reports that this attack compromised attorney email accounts, likely tied to ongoing Chinese-linked operations. Meanwhile, another group, known as Storm-2603, has been using the Velociraptor IR tool in ransomware attacks for persistent network access.

In the realm of malware, a new variant called "GPUGate" uses GPUs to evade defenses. This sophisticated approach highlights the growing threat landscape. Additionally, researchers identified a campaign weaponizing the open-source Nezha tool to deliver Gh0st RAT malware. This campaign is attributed to suspected Chinese threat actors.

Emergency patches have been issued by Oracle for its E-Business Suite, addressing a critical vulnerability exploited by the Graceful Spider threat actor. And, in a move to secure critical infrastructure, CISA has warned about actively exploited vulnerabilities, urging immediate patching.

Recently, the U.S. government added several Chinese entities to its Entity List for supplying military drone parts to Iran and its proxies. This highlights the complexity of global cyber threats and the need for robust defenses.

So, how can you stay safe? CISA recommends applying patches as soon as possible, disabling unnecessary ports and protocols, and implementing a centralized patch management system. Stay vigilant, and remember, every click counts!

Thanks for tuning in Don't forget to subscribe for more updates on China's cyber landscape. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
3 weeks ago
2 minutes

China Hack Report: Daily US Tech Defense
Beijing's Cyber Playbook: Nezha, Gh0st RAT, and the DC Law Firm Heist
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, this is Ting, and if you’re like me, you’ve had your coffee and your firewall logs open since 6 a.m. because the past 24 hours in US-China cyber have been—well, let’s just say “spicy.” I’ll walk you through the key plays, the people, the patches, and what you need to do right now to keep your systems from becoming the next trending hashtag in Beijing’s cyber playbook.

First up, let’s talk malware. The big news from Huntress is that Chinese-linked actors have weaponized the open-source Nezha monitoring tool—yep, that’s Nezha, not Nezuko—to deliver Gh0st RAT via PHPMyAdmin flaws. According to Huntress, this isn’t just a one-off: they’re using a slick log poisoning technique to plant web shells, and they’ve hit over 100 servers globally. If you’re running PHPMyAdmin, assume you’re on the menu, and patch yesterday. This is a classic case of turn-key open-source tools getting a malicious facelift, and it’s as subtle as a dumpling in a soup bowl.

Sector-wise, law firms got the spotlight this week. Williams & Connolly, the DC heavyweight that’s defended presidents and politicians, confirmed a breach via a zero-day attack, with a “small number” of attorney emails compromised, per the New York Times. The FBI’s Washington field office is leading the investigation, and CrowdStrike’s initial assessment points to a nation-state actor—no prizes for guessing which one. The good news: Williams & Connolly says client databases remain untouched, and they’ve brought in Norton Rose Fulbright and CrowdStrike for cleanup. But here’s the kicker: Mandiant’s September report confirms this isn’t a one-off. Since March, Chinese groups have been targeting US legal services and software firms, with a clear focus on scooping up intel on national security and trade. If you’re in legal, tech, or anything with IP worth stealing, consider this your wake-up call.

On the infrastructure front, the picture is grim. CISA—that’s the Cybersecurity and Infrastructure Security Agency—is running on fumes thanks to the government shutdown. Only a third of their staff are on duty, and the Cybersecurity Information Sharing Act just expired, so threat intel sharing between feds and private sector is down by as much as 80%. This is exactly the kind of chaos that makes hackers rub their hands together. CISA is still pushing out alerts, though, like the one about CVE-2025-4008 in Smartbedded Meteobridge—a command injection flaw that’s actively being exploited. If you use Meteobridge, patch now.

Let’s talk patches and warnings. Oracle just dropped an emergency update for CVE-2025-61882 in E-Business Suite—that’s a CVSS 9.8 critical, so don’t sit on this one. CrowdStrike is tracking the actor behind this as Graceful Spider, better known as Cl0p, but don’t get distracted—Chinese groups are still the main event. Meanwhile, Microsoft confirmed exploitation of CVE-2025-10035 in Fortra GoAnywhere, leading to Medusa ransomware deployment. If you haven’t updated to GoAnywhere 7.8.4, now’s the time.

So, what do you do? First, assume you’re targeted. Second, patch everything—PHPMyAdmin, Meteobridge, Oracle EBS, GoAnywhere. Third, lock down your email and web interfaces. Fourth, review your incident response plan, because if CISA’s hobbled, you’re your own first responder. And finally, share threat data with your peers—even if the feds are offline, the private sector’s threat intel feeds are still your best friend.

In short, this is no time for business as usual. The Chinese cyber playbook is evolving fast, and they’re hitting when the US is least prepared. But hey, that’s why you’re listening to me, right?

Thanks for tuning in to Ting’s daily cyber dispatch. If you want more of this straight to your inbox, subscribe, follow, and stay sharp. This has been a quiet please production, for more check out quiet please dot...
Show more...
3 weeks ago
4 minutes

China Hack Report: Daily US Tech Defense
Cyber Chaos: China's Spy School Shocker, Oracle's Cl0p Fiasco, and UAT-8099's SEO Scam
This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here with your daily dose of cyber chaos from the Middle Kingdom, and wow, what a wild 24 hours it's been in the world of Chinese cyber operations targeting US infrastructure.

Let's dive right into the biggest bombshell. A bombshell report just dropped linking the Beijing Institute of Electronics Technology and Application, or BIETA, directly to China's Ministry of State Security. This isn't just another research firm - we're talking about a front operation with at least four personnel tied to MSS officers. The kicker? They're connected to the University of International Relations, which we all know is basically spy school central. This revelation shows just how deep China's cyber tentacles reach into what appears to be legitimate academic research.

But that's not all, folks. We've got a massive surge in scanning attacks hitting Palo Alto Networks systems that has cybersecurity experts on high alert. GreyNoise detected over 1,280 unique IP addresses probing GlobalProtect and PAN-OS profiles on October 3rd - that's a staggering 500% increase from the usual 200. What's particularly interesting is that most of these scans originated from the US but were targeting systems in the US and Pakistan. Seven percent of those scanning IPs were confirmed malicious, with the remaining 91% classified as suspicious.

Meanwhile, Oracle is scrambling with emergency patches after the Cl0p ransomware group exploited a critical vulnerability in Oracle E-Business Suite. CVE-2025-61882 scored a perfect 9.8 on the CVSS scale, allowing unauthenticated remote attackers to completely compromise systems. Oracle's advisory warns that this flaw affects versions 12.2.3 through 12.2.14, and the attackers began their campaign on September 29th.

Adding to the chaos, we've got UAT-8099, a Chinese-speaking cybercrime group running a global SEO fraud ring using compromised Microsoft IIS servers. Most infections are hitting India and Thailand, but their reach is expanding rapidly.

On the defensive front, CISA just flagged CVE-2025-4008 affecting Smartbedded Meteobridge as actively exploited, adding it to their Known Exploited Vulnerabilities catalog. They're also dealing with ongoing sophisticated cyberattacks against multiple federal agencies using Cisco vulnerabilities.

The threat landscape is evolving faster than ever, with Chinese groups increasingly using supply chain attacks and sophisticated malware to penetrate US systems. From banking to defense contractors, no sector is safe.

Thanks for tuning in, listeners, and don't forget to subscribe for your daily cyber intelligence briefing. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
3 weeks ago
3 minutes

China Hack Report: Daily US Tech Defense
Digital Chaos: SIM Farm Sabotage, Login Probes, and the Phantom Taurus Strikes
This is your China Hack Report: Daily US Tech Defense podcast.

Ting here—your favorite cyber sleuth, always caffeinated and running on pure world-class paranoia. Buckle up, listeners, because the past 24 hours have been a joyride through digital chaos, Chinese intrigue, and high-stakes defense drama.

First, let’s talk Manhattan, where the Secret Service just nuked a massive Chinese-linked plot to disrupt New York City’s mobile networks during the UN General Assembly. Investigators say over 100,000 SIM cards were stealthily stashed around the city, hooked up to hundreds of SIM servers designed to assault cell towers, jam 911 calls, and let cyber-criminals chat anonymously. The SIM farm scheme was so big—more than 300 servers could pump out millions of anonymous texts per minute, basically turning emergency comms into dial-up purgatory. The fact that this happened right before world leaders landed in NYC tells you it wasn’t petty crime—it was infrastructure sabotage with a geopolitical flavor. The Secret Service insists no arrests are made yet, but timing? Downright suspicious, and supply chains for SIM hardware are under review. Also, telecom firms everywhere, please stop treating anomaly detection like a gym membership and actually use it.

On the digital front, Palo Alto Networks is the day’s punching bag. GreyNoise detected a blaring 500 percent surge in scans hitting Palo Alto login portals. More than 1,200 unique IPs were probing for weaknesses, with a chunk clustering in the Netherlands. What’s wild is that the scanning patterns are eerily similar to recent Cisco ASA activity—the fingerprints match, the tools sync up, and the timing is textbook pre-vulnerability-disclosure behavior. Translation, some very methodical folks are casing major U.S. network doors looking for cracks, and GreyNoise’s enhanced blocklists can’t get here fast enough.

Malware watch—the infamous Phantom Taurus, a newly identified Chinese state-aligned advanced persistent threat, just deployed the Net-Star suite across Africa, the Middle East, Asia, and, worryingly, it’s poking U.S. telecom and government targets now. Net-Star is like malware Swiss Army knives—modular, fileless, and designed to muck up IIS web servers while ghosts through standard detection. Palo Alto’s Unit 42 says Phantom Taurus is switching from basic email theft to snatching up raw database records and hiding deep in infrastructure. The lesson? Database admins, get your patch on and up your anomaly logging—yesterday.

CISA is still running emergency alerts despite a government furlough, and they’ve tagged new vulnerabilities in D-Link routers and a gnarly sudo utility flaw. The word from CyberWire and Security Affairs is clear: patch D-Link devices, update sudo, and don’t wait for FedEx to deliver the “urgent” sticker. Our good friends at Oracle and RedHat are still reeling from extortion campaigns and supply chain hits. If you’re running Jenkins, Juniper, or Samsung smart home devices, double-check CISA’s Known Exploited Vulnerabilities catalog for mandatory patches.

One more hot tip: Apple and Google both issued new rounds of security updates after malware attacks exploited weird font bugs and encrypted messaging platforms. If your company still doesn’t automate patching for mobile endpoints—this is your moment. Don’t make me come over.

All told, the past 24 hours have been about scale—whether it's SIM farms, unrelenting login scans, or malware operations feeding off neglected update schedules. Cyber defense right now means watching supply chains, rigging rapid response blocklists, and patching like your Starbucks depends on it.

Thanks for tuning in. Subscribe or risk missing tomorrow’s cyber soap opera—plenty more hacks where these came from. This has been a quiet please production, for more check out quiet please dot ai.

For more Show more...
4 weeks ago
4 minutes

China Hack Report: Daily US Tech Defense
China's Hacking Heyday: UAT-8099's Wild Ride as US Defenses Crumble
This is your China Hack Report: Daily US Tech Defense podcast.

Listeners, it’s Ting here—and trust me, today’s China Hack Report is one for the history books. Let’s jump in. In just the last 24 hours, U.S. cyber defenses got hammered on several fronts, and some of it ties directly to Chinese-linked actors ramping up their game. The biggest headline: Chinese-speaking cyber group UAT-8099 has been hijacking high-value Microsoft IIS servers—think the backbone for business operations. Cisco Talos detailed yesterday how these crooks slipped web shells onto trusted servers, escalated privileges, and used open-source tools like SoftEther VPN to tunnel deep, plant persistent access, and install the sneaky BadIIS malware. These BadIIS variants morph their code structures just enough to slip by your average antivirus, letting attackers quietly control university and telecom networks all the way from India to Brazil, with a strong focus on mobile users—yes, iPhone and Android folks are squarely in the crosshairs according to Cisco.

And if you’re thinking, “That sounds bad, Ting, but surely federal guidance is coordinated”—sorry to shatter that illusion. The Cybersecurity Information Sharing Act, yes, the CISA 2015 that glues together public-private partnerships for reporting threats in real time, expired this week thanks to good old U.S. gridlock. According to a WilmerHale alert and repeated pleas from the Protecting America’s Cyber Networks Coalition, this dramatically shrinks information sharing across industries, making it the perfect moment for international actors to swoop in. I’d say attackers probably threw a little party.

Meanwhile, CISA itself, the U.S. Cybersecurity and Infrastructure Security Agency, is fighting to keep up while reportedly understaffed and racing to contain the surge in vulnerability exploits. They fired off an emergency directive specifically warning organizations to urgently patch Cisco IOS and IOS XE devices, after threat actor activity spiked targeting those platforms. WaterISAC echoed this, telling water infrastructure firms: patch your Cisco gear, review configurations, and watch for signs of compromise—immediately.

Let’s talk malware: Broadcom fixed six VMware bugs, including a zero-day (CVE-2025-41244) actively exploited since last year by China-linked group UNC5174. If you run VMware Aria Operations or Tools, you need that emergency patch five days ago. And mobile defense hasn’t gotten easier—industry sources like Comparitech note that phishing and ransomware surged 40% across U.S. businesses, with manufacturing and tech firms—Collins Aerospace in particular—suffering major disruptions. China also rolled out a one-hour incident reporting rule for major cyber events, highlighting just how aggressive and nimble their response is compared to the long, bureaucratic slog in the U.S. If only we could borrow just a little of that speed—right, listeners?

So, here’s your Ting-approved action plan: patch your Cisco and VMware gear today, double-check privilege escalations on IIS or anything facing the web, boost monitoring for web shell activity, and—until Congress stops their time-out—get creative about sharing threat intel with your partners. We’re at Cybersecurity Awareness Month, after all, and the name of the game right now is relentless vigilance.

Thanks for tuning in to the China Hack Report—don’t forget to subscribe if you want the inside scoop and laughs to go with your daily doom scroll. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 month ago
4 minutes

China Hack Report: Daily US Tech Defense
Phantom Taurus Strikes Again: China's Covert Cyber Menace Targets the World!
This is your China Hack Report: Daily US Tech Defense podcast.

Hey there, folks I'm Ting, and I'm here to give you the lowdown on the latest China-linked cyber activities affecting US interests. Let's dive right in!

Over the past 24 hours, we've seen some serious action. Chinese state-sponsored hackers have been exploiting a critical VMware zero-day vulnerability, CVE-2025-41244, since October 2024. This high-severity privilege escalation flaw has been actively used by the group UNC5174 to gain unauthorized access. Thankfully, Broadcom has just patched this dangerous exploit, so make sure you update your systems ASAP!

Meanwhile, CISA has issued urgent directives regarding critical vulnerabilities in Fortra's file transfer solution and a Linux Sudo flaw. These vulnerabilities pose significant risks, so it's crucial to patch them immediately. Almost 50,000 Cisco firewalls are also vulnerable to actively exploited flaws, CVE-2025-20333 and CVE-2025-20362, which allow unauthenticated remote code execution. Cisco and CISA are urging immediate action to patch these vulnerabilities.

The Chinese APT group Phantom Taurus has been targeting government and telecommunications organizations across Asia, Africa, and the Middle East. They use custom malware like Net-Star to target web servers and have been linked to China's interests. This group's tactics are more covert than those typically associated with Chinese hackers, but they share infrastructure with other known groups.

In response, CISA and other authorities recommend immediate defensive actions, such as applying patches for vulnerable systems and enhancing security monitoring. Matthew Rosenquist, a cybersecurity expert, emphasizes the importance of rapid incident reporting, like China's one-hour rule, to mitigate threats effectively.

Thanks for tuning in, folks Don't forget to subscribe for more updates on cyber defense. This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 month ago
2 minutes

China Hack Report: Daily US Tech Defense
Cisco Firewalls Cracked! China's Cyber Pony ArcaneDoor Runs Wild in US Tech Corral
This is your China Hack Report: Daily US Tech Defense podcast.

Hey, cyber sleuths! It’s Ting here, your digital detective with a quick-witted keyboard and a soft spot for caffeine-fueled threat hunting. Let’s cut the small talk; you’re here for the latest on all things China, hacking, and US tech defenses—and wow, the last 24 hours have been a full-on cyber symphony.

Front and center: Cisco firewalls. Hundreds of these trusty gatekeepers have been bludgeoned by a campaign coming straight out of China—ArcaneDoor is the group’s name, and espionage is their (dis)honorable game. Over the weekend, Cisco and federal officials confirmed what was only whispered last May: US government agencies had their firewalls cracked wide open, leaving security logs, malware detection, and internal snooping completely blind. BitSight and Palo Alto Networks have been chasing these cats for months as they disable logging, intercept commands, and deploy persistent exploits that even survive a reboot. The CISA emergency directive basically said, “Everyone! Drop what you’re doing, identify every single Cisco ASA device, core dump, hunt for signs of compromise, and patch, patch, patch. Now!” Private sector, they’re talking to you, too—those exploits have no boundaries.

And this is barely a one-trick cyber pony. As Check Point Research just confirmed, the BRICKSTORM malware campaign is battering the legal, tech, and SaaS sectors with zero-day exploits engineered for straight-up espionage and, rumor has it, new zero-days under development. Google’s Threat Intelligence team also flagged the ‘Brickstorm’ campaign, tallying at 393 days—and yes, defense contractors are still very much in the crosshairs. Meanwhile, Recorded Future’s Insikt Group traced RedNovember (aka Microsoft’s Storm-2077) as they target perimeter appliances with a Go-based backdoor, with defense and infrastructure again on the receiving end.

If that sounds too industrial, let’s sprinkle a little more spice: the US is actively investigating a malware-laden email, spoofed as coming from a Republican lawmaker during sensitive trade talks with China. The tactic? Classic spyware in a new suit; the malware’s goal is simple—leak those US negotiation secrets like a busted faucet.

Now, the burning question: what’s new on the malware front? Cisco Talos mapped new RainyDay and PlugX variants, loaded with innovative encryption and DLL sideloading. These aren’t off-the-shelf tools—each payload is tailored for persistence and stealth, a hallmark of seasoned APTs like Naikon. PlugX and its buddies are now seen sharing RC4 keys and abusing legitimate applications for clandestine operations, a direct evolution since last year’s campaign.

CISA’s advice: hunt for persistent exploits, check your Cisco devices’ memory for malicious artifacts, and apply all available patches—especially for those blast-from-the-past zero-days. Check suspicious service logs, and if you find weird command history artifacts or unexplained system crashes, escalate immediately. Also, keep your endpoint threat emulation and email security updated; BRICKSTORM and its friends are watching.

Thanks for tuning in to today’s China Hack Report: Daily US Tech Defense! Subscribe, spread the word, and remember—next time a firewall blinks, it might be ArcaneDoor knocking. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Show more...
1 month ago
3 minutes

China Hack Report: Daily US Tech Defense
This is your China Hack Report: Daily US Tech Defense podcast.

China Hack Report: Daily US Tech Defense is your go-to podcast for the latest insights on China-linked cyber activities impacting US interests. Tune in daily to stay informed about newly discovered malware, sectors under attack, and emergency patches. Get expert analysis on official warnings and immediate defensive actions recommended by CISA and other authorities. Stay ahead of cyber threats with our timely updates and strategic insights to safeguard your tech infrastructure.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs