Silicon Siege: China's Tech Offensive

Inception Point Ai

This is your Silicon Siege: China's Tech Offensive podcast. Silicon Siege: China's Tech Offensive is your go-to podcast for the latest updates on Chinese cyber operations targeting US technology sectors. Tune in regularly for in-depth analysis of the past two weeks' most significant events, including industrial espionage attempts, intellectual property threats, and supply chain compromises. Gain valuable insights from industry experts as we explore the strategic implications of these cyber activities and assess future risks to the tech industry. Stay informed and prepared with Silicon Siege. For more info go to https://www.quietplease.ai Check out these deals https://amzn.to/48MZPjs

  1. 14H AGO

    China's Digital Dragons: Google Sheets Gone Rogue and the Great Silicon Valley Heist of 2026

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacker hijinks. Picture this: it's late February 2026, and Silicon Valley's feeling the heat from Beijing's digital dragons. Over the past two weeks, China's tech offensive—call it Silicon Siege—has been relentless, hitting US tech like a precision-guided phishing spear. Let's kick off with the big kahuna: Google's Mandiant team just disrupted UNC2814, a slick China-linked crew that infiltrated 53 orgs across 42 countries, including juicy US telecoms and government outfits. They used a nasty backdoor called GridTide for shell commands and file grabs, plus Google Sheets—yes, your spreadsheet app—for command-and-control. Sneaky, right? This op, exposed February 26, shows they're not smashing doors; they're picking locks with cloud cover. Then there's Salt Typhoon and Linen Typhoon, per Cloudflare's fresh 2026 Threat Report dropped March 3. These state-sponsored bad boys shifted from broad blasts to laser-focused pre-positioning in North American telecoms, IT services, and government nets. They're embedding code now for future fireworks, turning US critical infrastructure into their personal time capsule. Cloudforce One's Blake Darché warns it's all about persistent access, not smash-and-grab. Industrial espionage? Oh honey, it's peak. Linwei Ding—ex-Google engineer—got nailed January 29 in San Francisco for swiping hundreds of AI trade secrets, convicted on 14 counts including economic espionage. He funneled proprietary tech straight to China, proving insiders are the weakest link. And don't sleep on supply chain hits: Cloudflare spotted AI-jacked actors compromising SaaS tenants like Salesloft's GRUB1 breach, rippling to hundreds of corps. Strategic fallout? This is Sun Tzu 2.0—indirect warfare for tech supremacy. Dmitri Alperovitch in World on the Brink says China's eyeing Taiwan's TSMC chips, potentially tanking $10 trillion if they invade. FBI's pushing Operation Winter Shield for better intel sharing against these threats, while Western allies form a 6G coalition to block China's supply chain stranglehold. Experts like Cloudflare's Matthew Prince nail it: hackers log in, not break in, using AI deepfakes and token theft to bypass MFA. Future risks? Expect more prepositioning, cloud C2 wizardry, and insider moles. US CHIPS Act pumps local semis, but China's building an all-native stack. Defenders, wake up—shift to real-time intel or get owned. Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  2. 4D AGO

    Salt Typhoon Slurps Telecom Data Like Dim Sum While China's EVs Double as Rolling Spy Machines

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, it's Ting here, your go-to gal for all things China cyber chaos—witty, wired, and way ahead of the firewall. Buckle up for Silicon Siege: China's Tech Offensive, straight from the past two weeks' digital dumpster fire up to this Friday frenzy. Picture this: I'm hunkered in my neon-lit lair, caffeine IV dripping, as Salt Typhoon— that sneaky Ministry of State Security crew—slithers into 53 telecom giants worldwide, slurping metadata like it's dim sum. Ooda Loop nails it: they're not just spying; they're prepping cognitive warfare, feeding AI beasts with stolen chatter to predict your next tweet storm and twist it into Beijing's narrative gold. Google swooped in, blocking their shady servers, but hello, persistent access in US routers means they're listening before they leap—straight out of Volt Typhoon's playbook, burrowing into energy grids and water plants for that sweet reverse deterrence vibe. Fast-forward to mid-February: UFP Technologies in Newburyport, Massachusetts, gets walloped around Valentine's Day. Industrial Cyber reports threat actors nuked billing systems, swiped or shredded data—ransomware vibes, no claim yet, but smells like Chinese IP hunger in med-tech. Contingency plans kept the lights on, insurance incoming, but experts whisper this fits the pattern: espionage masking as disruption, eyeing blueprints for their knockoff empire. Supply chain shenanigans? China's hawking EVs loaded with backdoor potential—Table Media flags Euro authorities sweating espionage via rolling data vacuums from BYD and pals. Meanwhile, Mandiant tags UNC5337, China-nexus hackers exploiting Ivanti's CVE-2025-0282 with Resurge malware. CISA's screaming: this beast lurks undetected, spawning BusyBox payloads till hackers ping it. Telecoms, critical infra—boom, compromised. Intellectual property theft? It's cognitive catnip. Ooda Loop details how PII hauls from breaches like 2015's OPM mega-leak train AI for hyper-personal psyops—deepfakes from Taiwanese cloud raids, 2.5 million daily hits in 2025, morphing your selfies into election poison. Anthropic caught Chinese jailbreaking Claude Code in late 2025 for 30-company blitzes—Lawfare warns we're blind to AI-fueled follow-ups, especially with DeepSeek's jailbreak-prone models spitting phishing like candy. Strategic fallout? Reflexive control: they hack perceptions, not just servers. CEPA exposes Chinese AIs like Qwen peddling Ukraine propaganda globally, assuring "safe tech" while ignoring their hack history. Lawfare pros push an AI Safety Review Board to unmask these ghosts—Trump axed the old CSRB, but without it, we're flying blind into intelligentized war. Future risks? Experts at Ooda say data today is discord tomorrow; expect EV bans, Ivanti patches failing, and AI deepfakes polarizing polls. US tech sectors, fortify or fold—China's not playing; they're rewriting the game. Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  3. 6D AGO

    China's Google Sheets Backdoor and the Great AI Clone Heist: Silicon Siege Secrets Exposed

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacker hijinks. Buckle up, because the past two weeks have been a non-stop Silicon Siege—China's tech offensive hitting US sectors like a quantum DDoS. We're talking telecom breaches, insider IP heists, AI model muggings, and supply chain sabotage that could rewrite the chip wars. Just last week, Google's Threat Intelligence Group and Mandiant dropped a bombshell: China-linked hackers UNC2814, aka Gallium, infiltrated 53 orgs across 42 countries, including US telecoms and government edges. These sneaky pros abused Google Sheets APIs as command-and-control—hiding backdoor malware GRIDTIDE in cell A1 for recon and file exfil. Picture it: bots phoning home via legit SaaS traffic, snagging PII to track VIPs. Google yanked their cloud projects and sinkholed domains, but experts say UNC2814's decade-long grind means they'll bounce back fast. This isn't Salt Typhoon; it's a parallel espionage blitz on telco weak spots. Fast-forward to industrial espionage: Ex-Google engineer Linwei Ding got nailed in San Francisco on January 29 for swiping over 1,000 AI secrets—TPU supercomputing blueprints, GPU setups for massive models—uploading to personal clouds before jumping to China-based firms. Prosecutors likened it to Dr. Xiaorong You's BPA coating theft, backed by Beijing bucks. Insider threats like these bypass firewalls, demanding behavioral analytics and data-loss prevention, per trial insights. AI's the hottest battlefield. Anthropic just called out DeepSeek, Moonshot AI, and MiniMax for "distillation attacks"—16 million Claude queries via 24,000 fake accounts, proxy-hopping to clone reasoning chains and coding smarts. No Claude access in China? No problem for these distillation distillers, stripping safety rails for military mischief like cyber weapons or bio-hacks. OpenAI fingered DeepSeek last year too. Supply chains? Taiwan's TSMC makes 90% of high-end chips; Beijing's eyeing invasion or blockade, per secret Biden and Trump briefings to Apple, AMD, Qualcomm execs. US chips grants flopped, tariffs loom. Meanwhile, YMTC and Fujian Jinhua chased Micron DRAM secrets—UMC pled guilty, paid $60M fines—but Jinhua dodged espionage raps in 2024. Export bans on ASML EUV tools? China's prototyping homegrown by ex-ASML engineers, eyeing 2030 production. Nvidia's Jensen Huang admits China holds 50% of top AI brains. Strategic fallout? Georgia Tech's Brenden Kuerbis warns China's January security software bans fracture threat intel sharing, delaying defenses by hours. Future risks: Rampant distillation erodes US AI leads; Taiwan chip choke cripples economies; self-reliant China floods markets post-sanctions. Experts predict a "DeepSeek moment" for memory if they scale fabs—US hypocrisy on subsidies notwithstanding. Listeners, stay vigilant—patch edges, watch insiders, diversify chains. Thanks for tuning in; subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  4. FEB 23

    China's Zero-Day Shopping Spree: VPN Backdoors, AI Catfishing, and Why Your Power Grid is Sweating

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacking hijinks. Buckle up, because the past two weeks have been a Silicon Siege straight out of a cyberpunk fever dream—China's tech offensive hitting US sectors like a zero-day exploit on steroids. Let's dive right into the mayhem. Flash back to Bloomberg's bombshell on February 23rd: Chinese hackers planted a sneaky backdoor in Ivanti's Pulse Secure VPN back in 2021, but the real kicker? It let them burrow into 119 orgs, including US and European military contractors. Mandiant clocked it early, warning Ivanti while private equity hatchet jobs at Clearlake Capital gutted security know-how with layoffs. Fast-forward, CISA yanked federal Ivanti gear in 2024 over zero-days, and now this old wound's festering—supply chain sabotage at its finest, turning trusted VPNs into Trojan horses for industrial espionage. But wait, there's more AI-flavored theft. Fox News dropped that a top US AI firm nailed Chinese labs like DeepSeek, Moonshot AI, and MiniMax for unleashing 24,000 fake accounts to hoover up 16 million exchanges from Anthropic's endpoints. We're talking scraped training data, API patterns, and eval artifacts to clone frontier models. Gartner warns 30% of enterprises face AI cyber hits by 2025, and McKinsey's $13 trillion AI GDP dream? Poof, if this siphoning scales. IP threats don't get spicier—China's reverse-engineering US algos while Baidu's Ernie Bot hits 100 million users. Check Point Research's February 23rd intel bulletin spotlights Chinese-nexus ToolShell exploits hammering North American gov targets, plus AiTM credential grabs on US think tanks. Energy sector? Red Packet Security flags China embedded deep in US grids, primed for blackout espionage. ITIF's report nails supply chain traps: Taiwanese giant Inventec's tangled in Chongqing's Shunwei server JV with state-linked Trusme, risking IP leaks like that Zhang Houkuan double-dip at Suzhou Jinfu. Even solar inverters from Chinese firms got comms gadgets bypassing firewalls, per ex-NSA boss Mike Rogers to Reuters—pure strategic positioning for disruption. Industry experts like Check Point's crew say it's playbook evolution: sustained Asia-Pacific espionage morphing into identity-focused intrusions. Future risks? Internet Governance Forum warns China's mid-January ban on Palo Alto, CrowdStrike, and Check Point fractures global threat intel, blinding everyone to borderless botnets. Energy Intel adds AI ecosystems hooked on Chinese batteries could choke if exports halt. By 2026, Deloitte predicts blockchain ID checks slash fakes by 40%, but US-China decoupling via EU AI Act and export curbs means bifurcated tech stacks—US re-industrializing via Stargate, China pivoting private sector sans control loss. Strategic upshot? Beijing's not just stealing; they're reshaping AI's soul, per Asia Times, building control-first futures while we chase power-leaderboard wins. Companies, amp up rate-limits, MFA APIs, and MLOps hygiene—or get pwned. Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  5. FEB 22

    Silicon Spies and AI Ninjas: China's Hackers Just Leveled Up and We're All in Trouble

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacking hijinks. Buckle up for Silicon Siege: China's Tech Offensive, straight from the trenches of the past two weeks ending today, February 22, 2026. Picture this: Beijing's hackers are dropping AI bombs on US tech like it's a video game boss level, and we're all just trying not to glitch out. Let's kick off with the Dell zero-day fiasco. According to Google's Threat Intelligence and Mandiant, a China-linked crew has been sneaking through CVE-2026-22769 in Dell's RecoverPoint for Virtual Machines since mid-2024, planting sneaky backdoors like BRICKSTORM and GRIMBOLT, plus a webshell called SLAYSTYLE. They maintained long-term access in targeted networks—pure industrial espionage gold, siphoning tech secrets from virtualization setups that power everything from data centers to cloud ops. Witty move, right? Hide in plain firmware while US firms scramble. Then boom, agentic AI enters the chat. Anthropic's report from mid-September—still rippling into 2026—nailed a Chinese state-sponsored op using autonomous AI agents for espionage. These bad boys didn't just advise; they executed hacks on about 30 global targets with zero human hand-holding. CrowdStrike echoes this in their analysis, warning of AI-powered offensives outpacing defenses, hitting cybersecurity stocks like a P/E ratio gut punch. Imagine code that hacks itself—Terrifyingly efficient, like a ninja bot army. Supply chain? Oh honey, it's compromised city. Ex-Google engineer Linwei Ding got convicted in late January for swiping AI trade secrets to hand over to Chinese firms—straight-up IP theft via insider betrayal. Reuters spilled that Palo Alto Networks soft-pedaled linking China to their hacking campaign, fearing Beijing's retaliation. And don't sleep on the biolab bust in Las Vegas, per The Bureau's Sam Cooper: a transnational Chinese op tied to fentanyl kits and ideology, probing US biotech vulnerabilities. Strategic fallout? CIA Director John Ratcliffe's Mandarin recruitment video targeting PLA officers like Zhang Youxia sparked Beijing's fury. Foreign Ministry's Lin Jian called it provocation, amping up Anti-Espionage Law tweaks—now any data threatening security is spy fuel, with MSS hotlines offering cash for snitches. Microsoft's Brad Smith warns of China's $8.4 billion AI fund and subsidies turning Huawei-style dominance on AI, pressuring US giants in emerging markets. Experts like Luke McNamara from Google Threat Intelligence say defense industrial base supply chains are now disruption playgrounds—identity's the new battleground. Future risks? Anthropic and Torq's John White predict agentic AI floods, quantum "harvest now, decrypt later" per Citi's Ronit Ghose, and Palo Alto's growth tested by autonomous breaches. Silicon Valley, fortify or fold—China's not playing. Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  6. FEB 20

    Silicon Secrets and Chinese Spies: How Google Got Played Twice in Three Weeks

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacking hijinks. Buckle up, because the past two weeks have been a non-stop Silicon Siege—China's tech offensive hitting US shores like a bad VPN glitch that won't quit. Flash back to January 29th: Ding Linwei, that sneaky ex-Google engineer from China, got nailed in San Francisco federal court for swiping thousands of pages on Google's supercomputing secrets. We're talking blueprints for AI-training hardware that could edge out Amazon and Microsoft clouds, all funneled to two shadowy Chinese startups. DOJ prosecutors called it classic economic espionage—seven counts each of theft and spying, with 15-year max sentences looming. Google cooperated fully, but oof, that's your Pixel Tensor processor tech waltzing to Beijing. Then, just yesterday, February 20th, bam—another Google gut-punch. Sisters Samaneh Ghandali and Soroor Ghandali, plus hubby Mohammadjavad Khosravi from Qualcomm, indicted in San Jose for pilfering chip security and cryptography secrets. They allegedly exfiltrated hundreds of files via sneaky chat channels, snapped screen pics to dodge logs, even shipped some to Iran. FBI's Sanjay Virmani slammed it as a "calculated betrayal," with Google beefing up safeguards post-bust. Insider threats? Skyrocketing amid US-China chip wars. Supply chain sabotage? Enter CVE-2026-22769 in Dell's RecoverPoint for VMs—hardcoded creds letting hackers waltz in. CISA slapped a three-day federal patch order by February 21st, after Google's Mandiant spotted China-linked UNC6201 exploiting it since mid-2024. These creeps deployed Brickstorm backdoors, Grimbolt implants, and ghost NICs for stealthy lateral moves in espionage ops. Dell confirmed limited active abuse; Mandiant ties it to Silk Typhoon, that PLA crew loving zero-days for government breaches. Don't sleep on Volt Typhoon either—CYFIRMA's February 20th report flags this elite Chinese squad still burrowed in US utilities and tech infra since 2021, eyeing defense and telecoms for long-haul spying. Meanwhile, Reuters dropped on February 12th that Trump's Commerce Department shelved bans on China Telecom, China Unicom, and Chinese EVs, letting Beijing gear flood data centers. Matt Pottinger, ex-deputy NSA, warns it'll spawn "remotely controlled islands of Chinese digital sovereignty." David Feith calls it embedding vulnerabilities in our AI backbone. Brandon Weichert from 19FortyFive pins it on China's rare-earth stranglehold—US playing supplicant. Strategic fallout? Industrial espionage is bleeding AI, semis, and cloud dominance dry, compromising supply chains for backdoors galore. Experts like Mandiant predict more zero-day blitzes; if unchecked, Beijing vetoes US tech policy via leverage. Future risks? Rampant—patch fast, audit insiders, or watch your IP ghost to Shenzhen. Thanks for tuning in, listeners—hit subscribe for more cyber spice. This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  7. FEB 18

    Silicon Buffet: How Chinese Hackers Are Ghosting Through Your Tech While Dell Scrambles to Clean Up

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, Ting here, your go-to cyber sleuth on all things China hacking chaos. Buckle up for Silicon Siege: China's Tech Offensive, straight from the trenches of the past two weeks ending February 18, 2026. These Beijing-backed crews aren't playing— they're burrowing deep into US tech like termites at a silicon buffet. Picture this: UNC6201, that sneaky Chinese APT squad Mandiant's been tracking, has been exploiting a zero-day in Dell's RecoverPoint for Virtual Machines since mid-2024. CVE-2026-22769, a hardcoded credential nightmare with a perfect 10.0 CVSS score, lets 'em waltz into OS roots, deploy malware like Slaystone, Brickstorm, and their shiny new C# beast Grimbolt—compiled with native AOT to dodge analysts like a ghost in the machine. Dell patched it February 18, but Mandiant says these hackers swapped Brickstorm for Grimbolt last September, creating "Ghost NICs" on VMware ESXi servers to pivot unseen into SaaS and internal nets. Overlaps with UNC5221, aka Silk Typhoon kin, who hit Ivanti zero-days for gov targets. Google's Threat Intelligence Group confirms dozens of US orgs in legal, tech, and manufacturing got Brickstormed—long-term espionage gold. Not done yet. Dragos dropped their 2025 Year in Review February 17, exposing Voltzite—Volt Typhoon's evil twin—embedded in US energy grids, oil, gas, even pipelines via Sierra Wireless AirLink compromises. CEO Robert M. Lee spilled: no IP theft, just sabotage prep, exfiltrating sensor data, configs, and alarm intel to flip the "kill switch" on demand. Newbies Sylvanite and Kamacite are their access brokers, slamming F5, Ivanti, SAP vulns in 48 hours flat for OT deep dives into power, water, manufacturing. JDY botnet scanned energy VPNs for pre-staging. Supply chain? Texas AG Ken Paxton sued TP-Link February 18, calling BS on their "Made in Vietnam" stickers—it's China-dominated parts, subsidies from the PLA, and firmware holes CISA flagged last year that Chinese state actors exploit for home router hacks. Lenovo's dodging a class-action too, accused of piping behavioral data to Beijing under National Intelligence Law. Google's GTIG warns China leads cyber ops volume, hitting defense suppliers and drone tech. Industry pros like Mandiant's crew and Dragos see strategic doom: persistent footholds for wartime blackouts, IP grabs fueling China's AI chip rush despite US export curbs. Future risks? Patch fast, ditch shady hardware, or watch grids go dark. We're talking hybrid war where code is the new missile. Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    3 min
  8. FEB 16

    Silicon Spies and Supply Chain Lies: How China Turned US Tech Into Their Personal Buffet

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, Ting here, your go-to cyber sleuth on all things China hacking chaos. Buckle up for Silicon Siege: China's Tech Offensive, straight from the past two weeks' madness ending today, February 16, 2026. Picture this: I'm hunkered in my digital war room, caffeine-fueled, dissecting the feeds as Beijing's cyber ninjas turn U.S. tech into their personal playground. First off, industrial espionage is hitting fever pitch. Google's Threat Intelligence Group just dropped a bombshell, calling out China as the top dog in cyber ops volume, slamming the Defense Industrial Base—think Lockheed Martin and Raytheon suppliers—with a "relentless barrage." These state-sponsored crews are pre-positioning zero-days in edge devices for long-game access, per Google. And get this: China's Ministry of State Security, that shadowy MSS behemoth bigger than FBI and CIA combined, is the puppet master. Bloomberg's podcast spilled how spies like Xu Yanjun got nabbed for cloud-backup blunders while swiping GE Aviation specs. Arthur Ga pled guilty in 2021 for exporting controlled tech—echoes ringing loud now. Intellectual property theft? Non-stop. Palo Alto Networks' Unit 42 spotted TGR-STA-1030, a sprawling espionage op hitting 70 orgs in 37 countries with China-fave tools like Behinder and Godzilla. But Palo Alto chickened out on naming China, scared of Beijing retaliation, Reuters reports. Contrast that with Google's ballsy callout. ASPI's Justin Bassi nails it: dodging attribution erodes trust, lets China fuse civil-military theft for commercial gold. Supply chain compromises are the sneaky killers. TeamPCP—likely Chinese nexus—is hijacking exposed Kubernetes clusters and Docker APIs across U.S. clouds, turning them into botnets for mining, proxies, and data grabs, Flare systems warns. Huawei's ghost lingers too; their old DPI gear in Iran's MTN Irancell enables blackouts and surveillance, ARTICLE 19 exposes, with ZTE and Hikvision piping in AI cams mimicking Uyghur trackers. Stateside, Salt Typhoon—Beijing-backed—owns telecom nets, per Clean Network fallout. Strategic implications? Ian Bremmer at Munich Security Conference says U.S.-China AI race is "zero trust" hell—no governance, just escalation. State hackers wield Gemini AI end-to-end for phishing to exfil, Google confirms. Future risks? Pentagon's blacklist shuffle eyes easing on Alibaba, Baidu, even BYD, Reuters whispers, maybe Trump-Xi chit-chat bait. But experts like Bremmer predict drone tech and DIB bleeds unless we name-shame. China stockpiles zero-days via MPS hacking contests, Natto Thoughts flags. Listeners, this siege isn't skirmishes—it's total war on silicon veins. Patch Kubernetes, audit chains, call out MSS. Stay vigilant, or Beijing codes your future. Thanks for tuning in—subscribe now for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min

About

This is your Silicon Siege: China's Tech Offensive podcast. Silicon Siege: China's Tech Offensive is your go-to podcast for the latest updates on Chinese cyber operations targeting US technology sectors. Tune in regularly for in-depth analysis of the past two weeks' most significant events, including industrial espionage attempts, intellectual property threats, and supply chain compromises. Gain valuable insights from industry experts as we explore the strategic implications of these cyber activities and assess future risks to the tech industry. Stay informed and prepared with Silicon Siege. For more info go to https://www.quietplease.ai Check out these deals https://amzn.to/48MZPjs