About this episode
This is your Tech Shield: US vs China Updates podcast.Hey listeners, Ting here, and buckle up because this week in the cyber wars between the US and China has been absolutely wild. Let me cut right to it.So first, we've got this absolutely massive breach that's been dominating the conversation. Chinese state-sponsored hackers, specifically a group called Salt Typhoon, have reportedly compromised telecommunications giants AT&T and Verizon. We're talking about potential access to private communications of Americans abroad. The National Security Agency and international intelligence agencies are saying these actors are targeting the backbone routers of major telecom providers, essentially giving them the keys to the kingdom. They're modifying these routers to maintain persistent long-term access, which is frankly terrifying if you think about it.But here's where the defensive side kicks in. The agencies issued a joint cybersecurity advisory telling telecom providers to hunt for malicious activity and apply specific mitigations. It's basically saying we know you're compromised, now go find the stuff and clean it up. The government's also urging Americans to use encrypted messaging applications only, which tells you everything you need to know about how serious this situation is.Now, the Chinese aren't slowing down. Check Point Research just documented a new threat actor cluster called Amaranth Dragon with links to APT41, a major Chinese cyber espionage operation. They're targeting Southeast Asian governments using a WinRAR exploit, specifically CVE-2025-8088. These folks are sophisticated, tightly scoped, and operating with incredible stealth. They got this vulnerability weaponized just eight days after it was publicly disclosed. That's not amateur hour.Then you've got Mustang Panda, another Chinese group, running what researchers are calling PlugX Diplomacy. They're impersonating US diplomatic documents to lure government officials into opening malicious files. It's almost elegant in its simplicity, relying on trust rather than software vulnerabilities.On the defensive front, the Department of Defense just finalized CMMC 2.0, the Cybersecurity Maturity Model Certification. This is huge because it's now enforceable and tied directly to defense contractor eligibility. The government's also pushing FedRAMP 20x, a modernization effort to streamline cloud authorizations with increased automation. Meanwhile, the Department of Justice has been aggressively pursuing false claims cases against contractors misrepresenting their cybersecurity controls. We're talking nine settlements totaling fifty-two million dollars in 2025 alone.The gap here, though, is real. These defensive measures are solid, but they're reactive. We're patching vulnerabilities days or weeks after they're exploited. The Chinese are operating with discipline and preparation that frankly outpaces our ability