Ting Spills Tea: China Hackers Feast on Dead Routers While Carmakers Panic Over Beijing Bugged Teslas cover art

Ting Spills Tea: China Hackers Feast on Dead Routers While Carmakers Panic Over Beijing Bugged Teslas

Ting Spills Tea: China Hackers Feast on Dead Routers While Carmakers Panic Over Beijing Bugged Teslas

Listen for free

View show details

About this listen

This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to gal for all things China cyber chaos and hacktastic defenses. Buckle up, because the past week in US-China CyberPulse has been a whirlwind of bans, mandates, and AI shields lighting up the feeds like a neon-lit firewall.

Picture this: I'm scrolling through my feeds on February 6th, and bam—CISA drops BOD 26-02, ordering federal agencies to purge unsupported edge devices like ancient routers and VPNs within 12 months. Why? Chinese state hackers, including those sneaky DKnife crews with their seven Linux implants, are feasting on these EOL relics for deep packet inspection and malware drops via compromised CentOS boxes. CISA's not messing around; inventory in three months or bust, all to starve out nation-state nibblers from Beijing.

Meanwhile, over in auto-land, the Commerce Department's Bureau of Industry and Security is cranking the heat with a March 17 deadline banning Chinese software from connected vehicles. Think cameras, mics, and GPS in your Tesla or Volvo—no more phoning home to Shanghai. Wall Street Journal reports carmakers like those sourcing from Quectel are scrambling, with Ohio's Eagle Wireless snapping up their code to onshore cellular modules. Even Pirelli's sweating Sinochem stakes in smart tires. CEO Matt Wyckhouse of Finite State quips suppliers hoard IP like dragons, but hey, exemptions might buy time if you prove you're not a rolling data piñata.

Private sector's flexing too—Glilot Capital's survey shows 78% of CISOs, from Blackstone to Rakuten, dumping 2026 budgets into AI-powered defenses. Nearly 60% bet AI ops go standard by year's end, hunting AI attacks and securing code gens. Check Point's Amaranth-Dragon, tied to APT41, just exploited WinRAR for Southeast Asia gov hits, but US firms are countering with tools to spot that jazz.

Internationally? Taiwan's ITRI inks a deal as AUVSI's cyber lab for drone pen-testing, funneling strategic access to US markets—nice sidestep from Huawei woes. NATO's Cyber Coalition in Estonia's CR14 range just wrapped its biggest drill ever, 29 allies plus partners simulating hybrid threats below Article 5, with massive China ripple effects.

And don't sleep on supply chain stings: China-linked hackers hit Notepad++ updates, per Ho's blog, prompting CISA probes. Ex-Google's Linwei Ding got nailed for swiping 2,000 AI docs to a China startup—DoJ justice served.

Witty wrap: Beijing's Typhoon hackers are rewriting rules, but Uncle Sam's decoupling via NDAA AI safety clauses and Kerberos shifts from Microsoft. We're onshoring, AI-armoring, and ally-ing up—China's checkers vs. our chess.

Thanks for tuning in, listeners—subscribe for more CyberPulse zaps! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
No reviews yet