Digital Dragon Watch: Weekly China Cyber Alert
Microsoft's China Shocker: Pentagon Secrets Exposed in Cloud Fiasco
20 Aug 2025
This is your Digital Dragon Watch: Weekly China Cyber Alert podcast.It’s Ting back with your Digital Dragon Watch: Weekly China Cyber Alert, and if you thought August was going to be a snooze, you’re in for a spicy surprise. Let’s dive right into the digital flames of the past seven days—no time for filler, because Microsoft and Beijing clearly didn’t get the memo on quiet summer months.Kicking off: the jaw-dropper. According to a deep-dive by ProPublica, Microsoft failed to disclose to the Pentagon that it used engineers based in China to work on ultra-sensitive Defense Department cloud systems. Not a great look when the Office of the Director of National Intelligence tags China as America’s “most active and persistent cyber threat.” They used a digital escort model—where U.S.-cleared personnel babysit the foreign engineers, but crucial risk details were omitted from security plans. After a government probe and subsequent outrage, Microsoft has allegedly cut off China-based engineers from these contracts. John Sherman, former DoD Chief Information Officer, called out Microsoft’s “digital escort” workaround as something that “doesn’t pass the common sense test.” The lesson for listeners: demand total supply chain transparency from your cloud vendors, especially for any government work.Now, new vectors. Cisco Talos spotted that a China-aligned group dubbed Salt Typhoon—also known as Operator Panda—weaponized an old Cisco IOS vulnerability (CVE-2018-0171) in cyberattacks late last year targeting major U.S. telecom firms. Vulnerabilities in legacy infrastructure keep showing up, making this a favorite playground for both Russian and Chinese actors. The recent FBI and Cisco warnings underline that patching isn’t optional—it’s existential. If you're still running ancient, unpatched routers, better make your next meeting with IT a priority.Targeted sectors? Critical infrastructure—energy, telco, water systems—remains firmly in Beijing’s crosshairs. The National Security Memorandum signed earlier this year doubled down on protecting these lifelines, with CISA now quarterbacking coordination, risk assessments, and the soon-to-drop National Infrastructure Risk Management Plan. Volt Typhoon, a Chinese actor, is still fresh in everyone’s mind for its deep, persistent targeting of U.S. utilities. The defensive playbook here: continuous vulnerability scanning, rigorous vendor due diligence (no surprise Chinese contractors!), and incident response plans that get blessed by red teams.Meanwhile, regulatory heat is rising on Beijing’s home turf. China’s National Cybersecurity Standardisation Technical Committee is tightening rules on “Minor Mode,” which now demands lower screen time limits for kids, age-appropriate controls, and mandatory parental oversight. There’s also a draft clampdown on AI—banning the fabrication of marketing content in e-commerce. U.S. policymakers should take notes. Regulation isn’t just reactive anymore; China is setting its own standards—sometimes to global effect.Let's not forget geopolitics, because this cyber drama plays out in tandem with escalating tech investment scrutiny. The Committee on Foreign Investment in the United States, or CFIUS, is rolling out ever-stricter reviews on any foreign investment with a China nexus. More transparency and risk rigor are the top asks from Washington, and after the Microsoft episode, expect the screws to tighten even further.So, expert recommendations for all you digital defenders: patch the basics, vet your vendor personnel by geography, stay current on sector-specific risk frameworks, and keep an eye on those regulatory moves—because what starts in Beijing rarely stays there.That’s this week’s Digital Dragon Watch. Thanks for tuning in—make sure you subscribe for fresh alerts and expert insights. This has been a quiet please production, for more check out quiet please dot ai.For more http://www.quietplease.aiGet the best deals https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
13:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
10:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
13:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana