This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacking hijinks. Buckle up, because the past two weeks have been a non-stop Silicon Siege—China's tech offensive slamming U.S. innovation like a rogue DDoS on steroids. Picture this: I'm hunkered down in my digital war room, caffeine-fueled, watching Beijing's hackers treat American tech sectors like an all-you-can-steal buffet. Kicking off with industrial espionage, the U.S. Justice Department just dropped indictments on twelve Chinese hackers tied to Ministry of State Security units. These sneaky contractors from outfits linked to Beijing's enforcers have been burrowing into aerospace giants like Boeing, national labs, and defense contractors for years, swiping pandemic research and blueprints. According to CybelAngel’s 2025 threat roundup, it's all about blending cybercrime with state ops for max intel haul. And get this—UAT-9686, that shadowy Chinese crew, exploited a zero-day in Cisco’s AsyncOS software, CVE-2025-20393, hitting Email Security Appliances since early December. Rapid7 scanned and found over 800 exposed Cisco gateways ripe for root access, letting them plant backdoors in Fortune 500 email flows. Cisco’s Talos team is scrambling with workarounds, but it's déjà vu from Salt Typhoon's 2024 telecom rampage. Supply chain? Oh, it's compromised AF. CISA's fresh alert on Brickstorm malware—deployed by Warp Panda, a China-nexus beast—has been lurking in VMware vCenter setups at legal firms, manufacturers, and tech outfits since 2023, with fresh Rust-based samples popping up last week. CrowdStrike nailed it: these creeps exploit edge devices for long-term persistence, exfiltrating via encrypted WebSockets. Bitsight’s TTP breakdown shows China-aligned actors loving public-facing app exploits like CVE-2025-58360 in GeoServer, plus phishing for creds in telecom and energy. FDD warns Chinese gear on the FCC’s Covered List—like Huawei components—poses sabotage risks to U.S. networks, pushing for bans on any tainted parts. IP threats? Nonstop. China’s data lake obsession, per ex-colonel Philip Ingram, means stealthy long-dwell ops harvesting proprietary goodies from AI model devs and semis. DeepSeek’s AI is now cozying up with 20 Chinese carmakers for smart vehicle integrations, per Homeland Security Newswire, funneling U.S.-style data back home despite intel laws forcing compliance. Strategically, this is deterrence erosion city. ITPro’s Darrel Lang says pre-positioned backdoors in CNI like utilities are priority one for CCP tech dominance, with IP theft now secondary. Future risks? Ingram predicts Typhoon-style campaigns ramping in 2026, targeting AI ecosystems amid U.S. export curbs on AMD’s MI308 chips to Alibaba—Beijing’s building its own arsenal. Experts like Nick Andersen at CISA urge zero-trust and anomaly hunts, but with CRINK nations (China, Russia, Iran, North Korea) escalating, we're staring down persistent espionage waves that could flip crises into catastrophes. Whew, listeners, that's the siege in real-time—stay vigilant, patch those edges! Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI