• Living Off the Land: How China's Hackers Are Ghosting Your Defenses With Tools You Already Own
    May 20 2026
    This is your Digital Dragon Watch: Weekly China Cyber Alert podcast. I’m Alexandra Reeves, and this is Digital Dragon Watch: your weekly China cyber alert. Over the past week, China-linked cyber activity has focused less on splashy ransomware and more on quiet persistence: data theft, infrastructure mapping, and testing of Western defenses. According to Verizon’s 2026 Data Breach Investigations Report, state‑affiliated actors linked to China remain heavily focused on credential theft and living‑off‑the‑land techniques. Instead of dropping obvious malware, intruders increasingly abuse built‑in tools like PowerShell, WMI, and remote management agents, which makes detection harder for overworked security teams. Verizon highlights that multi-factor fatigue attacks and token theft are now a preferred way in, especially against U.S. government contractors and managed service providers. In parallel, the European Parliament’s recent plenary session on EU cybersecurity and AI development underscored persistent concern about Chinese advanced persistent threat groups targeting European critical infrastructure, particularly energy, transportation, and telecoms. Lawmakers pointed directly to the risk that AI‑enhanced intrusion tools could supercharge campaigns resembling past operations like Volt Typhoon, which quietly probed U.S. power, ports, and pipelines. The nonprofit METR, in its Frontier Risk Report for February and March, notes something that should worry every listener: a large fraction of AI‑assisted agent activity at major tech firms wasn’t reviewed by any human. Combine that with China’s long‑running push for automated surveillance platforms like the Xueliang, or Bright Eyes, system described by NetAskari in Hebei’s Zhangjiakou region, and you get a clear trajectory: Beijing is building end‑to‑end, AI‑driven monitoring and exploitation capabilities, both at home and potentially abroad. On the policy front, Johns Hopkins University’s recent discussion of the Trump–Xi summit highlighted that while high‑level diplomacy may stabilize trade and military tensions, it is not slowing offensive cyber operations. U.S. officials continue to publicly attribute infrastructure intrusions to Chinese state actors and quietly pressure allies to harden 5G, satellite links, and subsea cable landing stations. So how do you defend against this evolving toolkit? Experts contributing to Verizon’s DBIR emphasize three moves. First, assume compromise and prioritize identity: enforce phishing‑resistant multi‑factor authentication, monitor for impossible travel and anomalous session tokens, and lock down admin accounts behind hardware keys. Second, focus on visibility for those living‑off‑the‑land behaviors: centralized logging, endpoint detection tuned to scripting engines, and strict application control in critical environments. Third, build resilience: segmentation for OT networks in power, manufacturing, and transport; tested incident response runbooks; and backups isolated from domain credentials. For organizations doing business in or with China, Hong Kong M&A analysts at China Briefing warn that data residency, AI governance, and exposure of internal networks to Chinese partners are now core cyber risk questions, not legal footnotes. If your deal team isn’t talking to your CISO, you are sleepwalking into trouble. That’s it for this week’s Digital Dragon Watch. Thanks for tuning in, and don’t forget to subscribe so you never miss an alert. This has been a quiet please production, for more check out quiet please dot ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta
    Show More Show Less
    5 mins
  • Alexandra Reeves Spills Tea on China's AI Cyber Weapon and Beijing's Power Move That Killed a Zambian Tech Summit
    May 4 2026
    This content was created in partnership and with the help of Artificial Intelligence AI.
    Show More Show Less
    4 mins
  • Beijing's Two Billion Dollar AI Breakup and Why Japan Should Be Very Nervous Right Now
    May 3 2026
    This content was created in partnership and with the help of Artificial Intelligence AI.
    Show More Show Less
    4 mins
  • Dragon Bytes and Deepfake Execs: China's AI Hackers Are Coming for Your Supply Chain
    May 1 2026
    This is your Digital Dragon Watch: Weekly China Cyber Alert podcast. Hey listeners, Alexandra Reeves here with Digital Dragon Watch, your weekly China cyber alert. Diving straight into the past seven days ending May 1, 2026—no fluff, just the tech-heavy hits on Beijing's digital shadow games. First up, a sneaky new attack vector emerged from what FortiGuard Labs is calling APT41 variants, those persistent Chinese state-linked hackers. According to FortiGuard Labs' Outbreak Alerts, they've weaponized agentic AI—think autonomous bots that chain social engineering with zero-day exploits. This isn't your grandma's phishing; these scripts personalize deepfake calls mimicking US execs from firms like Lockheed Martin, targeting aerospace supply chains in Virginia and California. Europol's IOCTA 2026 report backs this, noting Chinese criminal networks outside the EU scaling AI-assisted impersonations to hit financial sectors hard, with over 200 incidents logged last week alone. Targeted sectors? Defense and tech lead the pack. Check Point's Live Cyber Threat Map showed spikes from IP clusters in Shenzhen hitting US telecoms—Verizon and AT&T nodes in New York took DDoS barrages clocking 500 Gbps, per their real-time feeds. Semiconductors got hammered too; TSMC's Arizona fab reported probing scans traced to Shanghai-based actors, as flagged by SOCRadar Labs' threat profiles. Even stablecoins entered the fray—Russia's dodging sanctions via A7A5 tokens, pushed by China's own sanction fears, according to Small Wars Journal analysis. This enables gray-zone funding for cyber ops, blending finance with espionage. US government response was swift. CISA issued an urgent advisory on April 28, attributing exploits to Mustang Panda, a Beijing crew, and mandating multi-factor patches for federal networks. FBI's Cyber Division in San Francisco coordinated with NSA, rolling out indicators of compromise for 15 malware families linked to these groups, straight from their joint bulletin. No attributions named Xi Jinping directly, but his fresh push for AI and semis dominance—echoed in MEXC News coverage of his speeches—fuels the fire, positioning China as the tech powerhouse behind these threats. Expert recs for protection? Bi.Zone and Malpedia urge zero-trust architectures: segment your networks, deploy AI anomaly detectors like those from Darktrace, and run credential scans via tools like CredenShow or HIB Ransomed to catch breaches early. Thales' graphical attack explorer recommends behavioral analytics to spot agentic AI intrusions—train your SOC teams on TTPs from MISP Galaxy clusters. For enterprises, Kaspersky's Cyberthreat Map suggests endpoint hardening with EDR tuned for Shenzhen-origin traffic. Listeners, stay vigilant—the Dragon's digital claws are sharper than ever. Patch now, hunt proactively. Thanks for tuning in—subscribe for weekly drops. This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai This content was created in partnership and with the help of Artificial Intelligence AI.
    Show More Show Less
    4 mins
  • ByteDance Gets Busted: China's AI Crackdown Gets Real While Patent Fraudsters Face the Music
    Apr 29 2026
    This is your Digital Dragon Watch: Weekly China Cyber Alert podcast. # Digital Dragon Watch: Weekly China Cyber Alert Hey listeners, Alexandra Reeves here with your weekly China cyber rundown, and this week we've got some serious regulatory enforcement action mixed with some troubling AI governance gaps. Let's jump right in. China's cyberspace regulator came down hard on ByteDance this week, specifically targeting three of their platforms: the video editing apps Jianying and Maoxiang, plus the AI website Jimeng. The Cyberspace Administration of China found that these platforms failed to properly label AI-generated content, which violates rules that went into effect back in September 2025. The violations are significant enough that authorities summoned ByteDance leadership, ordered rectification measures, and handed out penalties, though they kept the specific penalty details under wraps. What this tells us is that China's taking AI transparency seriously, and if you're operating platforms in that space, you better have robust content labeling systems in place. But here's where it gets interesting. On the same day, China's Ministry of Industry and Information Technology approved 690 new industry standards, including technical specifications for AI deep learning systems. This dual approach—aggressive enforcement against non-compliance while simultaneously establishing clearer technical standards—shows Beijing is trying to create a more structured AI ecosystem. They're not just punishing violations; they're building the framework so companies know exactly what's expected. Beyond ByteDance, China's also launched what they're calling a Year of Rectification and Standardization for the intellectual property agency industry. The National Intellectual Property Administration, working with the Ministry of Public Security and State Administration for Market Regulation, is targeting patent fraud schemes and what they call black and gray market chains. They're investigating everything from forged patent applications to people illegally renting out agency credentials. This campaign runs through the end of 2026 and includes criminal prosecution pathways for serious violations. What's concerning for cybersecurity professionals is that these enforcement actions reveal infrastructure weaknesses. When you've got widespread patent fraud and unlicensed operators, you're looking at potential vectors for intellectual property theft and compromised supply chains. The fact that authorities are doing follow-up reviews of agency self-inspections through June suggests they found significant problems during initial sweeps. For those of you monitoring China's tech landscape, the pattern here is clear: Beijing is consolidating control through regulation and enforcement. They're establishing what they call credit-based and intelligent supervision systems, which means they're building AI-driven monitoring infrastructure to track compliance. That's going to have ripple ef This content was created in partnership and with the help of Artificial Intelligence AI.
    Show More Show Less
    4 mins
  • China's Data Fortress Gets Walls While Apps Get the Boot: CAC Cracks Down and Uncle Sam Side-Eyes DeepSeek
    Apr 27 2026
    This is your Digital Dragon Watch: Weekly China Cyber Alert podcast. Hey listeners, Alexandra Reeves here with Digital Dragon Watch, your weekly China cyber alert. Diving straight into the past seven days' pulse on Beijing's cyber moves—it's been a whirlwind of regulatory hammers and tech escalations as of April 27, 2026. China's Cyberspace Administration, or CAC, dropped bombshells in their March 2026 update, published just yesterday by Bird & Bird. They're cracking down hard on app overreach: Beijing's Communications Administration delisted four rogue apps for sneaky personal info grabs, like hoarding location data without consent and shoving targeted ads. Guangdong CA flagged 31 more for excessive permissions and illegal biometric processing—think student IDs and phone numbers scooped without school nods. Jiangsu CAC's 2025 enforcement recap, still rippling, exposed server flaws letting hackers tunnel cross-border data via sloppy firewalls and unencrypted sensitive fields. New attack vectors? Watch for interface logic holes in apps and disorganized server rooms turning internal nets into export pipelines. Targeted sectors scream automotive and low-altitude economy—MIIT's Automotive Data Export Security Guidelines demand encrypted transmission, one-week full logs, and three-year retention, balancing EV boom with data locks. Science and tech services get a standards blitz, aiming for 40 new norms by 2027. Even banks aren't safe: People's Bank of China fined a Shaoxing branch for data security lapses. US side? State Department cables, per Times of India reports, order diplomats to spotlight Chinese AI firms like those in DeepSeek hoovering American tech for models—flagging supply chain risks amid Trump trade truces. No direct incident responses yet, but it's prepping economic countermeasures as Beijing builds anti-supply-chain-shift laws. Defensive playbook from experts: TC260's fresh standards mandate compliance audits for personal info transfers—encrypt everything, de-identify ruthlessly, and log like your life's data depends on it. Adopt multi-level protection schemes for critical infra, per MIIT's low-altitude push. Sichuan's brewing provincial cyber regs signal localized teeth. Omdia's take? China's cloud spend hit $14.7 billion in Q4 2025, up 26%, fueling AI threats—harden your stacks now. Bottom line, listeners: China's fortifying its data fortress while probing weaknesses abroad. Layer up with identity auth, audit trails, and zero-trust per CAC guidelines. Stay vigilant. Thanks for tuning in—subscribe for the edge. This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI.
    Show More Show Less
    4 mins
  • GopherWhisper Spills the Tea: China's New Cyber Gang Slides Into Your Slack DMs and Discord Servers
    Apr 26 2026
    This is your Digital Dragon Watch: Weekly China Cyber Alert podcast. Hey listeners, Alexandra Reeves here with Digital Dragon Watch, your weekly China cyber alert. Diving straight into the past seven days' hottest threats as of April 26, 2026. ESET just dropped a bombshell report on GopherWhisper, a fresh China-linked APT group that's been prowling since at least November 2023, but ramping up hits in 2025 and now. They nailed a Mongolian government entity, infecting about 12 systems with sneaky Go-based backdoors like LaxGopher, which hijacks Slack for command-and-control chats, exfiltrating files and spawning payloads. RatGopher flips to Discord for C2, uploading downloads via file.io, while SSLORDoor uses OpenSSL over raw TCP sockets to hide command prompts and manipulate files. Then there's BoxOfFriends leaning on Microsoft Graph API through Outlook drafts for stealthy exfil and shell access, loaded by the FriendDelivery DLL injector. ESET attributes this whole toolkit to GopherWhisper—no matches to known groups—targeting government sectors with legit services as cover, a slick new vector abusing trusted platforms like Slack, Discord, and Outlook to dodge detection. Over in the US, Senate Judiciary Committee fired warnings on April 25. Senator Thom Tillis pegged China's IP theft at $400 to $600 billion yearly, calling it a national security gut punch aimed at stealing America's innovation crown. Senator Richard Durbin slammed Beijing's economic espionage, costing $225 to $600 billion annually, gutting R&D incentives. No fresh executive actions announced, but bipartisan heat signals tighter scrutiny on China tech flows. Defensive plays? Experts urge segmenting comms tools—firewall Slack, Discord, and Outlook APIs rigorously. ESET recommends behavioral monitoring for anomalous C2 over legit services, plus Go malware hunters like YARA rules tailored to LaxGopher's drive enumeration. For IP defense, Jazz CEO Ido Livneh pushes AI-driven data loss prevention ahead of World IP Day today, locking down high-stakes leaks. China's pushing back with state-controlled AI governance, weaving strict data flows into national security, per NextIAS analysis—think centralized clamps on frontier models to counter autonomous cyber risks. But as Finance Minister Nirmala Sitharaman noted in ET Awards chatter, threats like Mythos rival Iran-level digital wars. Stay vigilant, listeners—patch those APIs, audit cloud integrations, and run multi-engine scans. Train your teams on living-off-the-land tactics. Thanks for tuning in—subscribe for more Dragon Watch intel. This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI.
    Show More Show Less
    4 mins
  • China's Router Army: How Grandma's WiFi Became a Spy Tool Plus AI Hacks an 8-Year-Old Bug in Minutes
    Apr 24 2026
    This is your Digital Dragon Watch: Weekly China Cyber Alert podcast. Hey listeners, Alexandra Reeves here with Digital Dragon Watch, your weekly China cyber alert. Over the past seven days ending April 24, 2026, the big story exploding across headlines is China-linked hackers industrializing massive botnets of compromised SOHO routers and IoT devices to mask their ops. According to a joint advisory from the US CISA, UK's NCSC, and allies like Australia, Canada, Germany, Japan, the Netherlands, New Zealand, and Spain, these state-backed actors are scaling up covert networks for reconnaissance, malware drops, and data exfil targeting critical sectors worldwide. These aren't your grandma's botnets—they're dynamic, low-cost swarms where hackers hop through hundreds of thousands of endpoints, dodging IP blocks by constantly rotating in fresh compromised gear. Dark Reading reports China's groups are treating this like a factory line: infect everyday home routers, then proxy attacks for deniability. Sectors hit hardest? Think telecoms, energy, and government, with persistent access for espionage. No major breaches named this week, but the advisory flags these networks as the new vector, evolving from sporadic use to strategic scale. US government response was swift and multilateral. CISA dropped the advisory on April 23, urging orgs to map networks, baseline normal traffic, and enforce MFA on remote links. High-risk spots get zero-trust mandates: IP allowlisting, SSL certs, and segmentation to starve these proxies. Cybersecurity Dive notes evidence points to Chinese firms like those in Beijing actually building and maintaining these networks for the PRC—talk about dual-use tech gone rogue. On the AI front, Anthropic's Claude Mythos preview, announced April 7, lit a fire under China's cyber scene. South China Morning Post says shares of Qi An Xin, Sangfor Technologies, and 360 Security Technology spiked as investors bet on AI arms race. 360 Digital Security Group bragged about their Multi-Agent system nabbing CVE-2026-32190—a critical eight-year-old Office flaw—in minutes, topping Tianfu Cup. SecurityWeek compares it to Mythos-level vuln hunting, though Microsoft credits Taiwan and South Korea for another kernel bug, CVE-2026-24293, casting shade on 360's claims. Expert recs? NCSC and CISA push proactive hunts: patch routers, segment IoT, monitor for anomalous outbound traffic. "Static blocklists are dead," the advisory warns—go dynamic with threat intel feeds. For you defenders, prioritize SOHO gear audits and behavioral analytics to spot the hoppers. Stay vigilant, listeners—this Dragon's breath is getting hotter with AI-fueled precision. Thanks for tuning in to Digital Dragon Watch—subscribe now for weekly drops. This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI.
    Show More Show Less
    4 mins