Auquan is reshaping financial services with AI agents that automate research, risk, and ESG reporting. Trusted by top global institutions, its platform removes manual work so teams can focus on strategy, not formatting.
AI cheating tool Cluely has raised $5.3 million to offer real time, undetectable support during interviews, exams, meetings, and more. Creator Chungin “Roy” Lee says the tool redefines cheating, arguing it helps people work smarter—not break the rules.
Spur, an AI driven startup, has raised $4.5 million to automate website testing. Users type commands like “add to cart” or “apply for a job,” and Spur’s agent simulates the action, detects bugs and gives instant feedback, making quality checks faster and easier for development teams.
Cyber Warfare Escalation: Unveiling the New Era of U.S.-China Digital Conflict
China’s "Salt Typhoon" hackers have breached U.S. telecoms, raising cyber tensions. Experts warn of the threat to international stability, emphasizing the need for collaborative strategies to prevent escalation amid ongoing economic competition.
Incoming Trump Administration Faces Immediate Cybersecurity Challenges After PRC Hacks
As Trump prepares to take office, U.S.-China relations face mounting tension, intensified by the recent "Salt Typhoon" hack targeting U.S. telecom networks. The breach signals rising cyber threats and AI rivalry, prompting urgent calls for strategic dialogue to avoid conflict and stabilise ties.
With President-elect Donald Trump poised to take office, the United States is set to enter an even more contested future with China amid escalating threats in cyber warfare and the technological AI race. As the "dust hasn't even settled yet" on the recent U.S. election results, the incoming Trump administration faces immediate cybersecurity challenges following significant breaches by China's state-sponsored hacking group "Salt Typhoon."
These hackers infiltrated major U.S. telecommunications companies, accessing sensitive cellular logs and user data. The incidents intensify cyber tensions between the U.S. and China, highlighting urgent concerns over federal response measures and critical infrastructure protection amidst intensifying economic and political competition.
Investigators are highly concerned that the Salt Typhoon may have stolen cell phone records of millions of Americans as they work to remove the hackers from some of the nation's leading phone companies.
Salt Typhoon Breaches Intensify Tensions and Highlight Critical Infrastructure Vulnerabilities
The cyber battlefield between the United States and China has escalated dramatically with the recent infiltration of major U.S. telecommunications companies by Chinese state-sponsored hacking groups, notably "Salt Typhoon." This series of breaches has not only heightened cyber tensions between the two nations but also exposed significant vulnerabilities in critical infrastructure, prompting urgent calls for enhanced cybersecurity measures and international cooperation.
Detailed Profiles of Chinese Cyber Threat Actors
Currently, three primary "Typhoon" threat actor groups have been publicly identified, each employing sophisticated tactics and targeting critical sectors:
Volt Typhoon: Known for utilizing "living off the land" techniques, Volt Typhoon leverages built-in network tools to achieve objectives without deploying detectable malware. Their operations focus on U.S. critical infrastructure with the intent to disrupt rather than conduct espionage. By blending into normal network activities, they make detection and attribution exceedingly difficult.
Flax Typhoon: Linked to PRC information security firms operating under government direction, Flax Typhoon targets critical infrastructure in Taiwan and the United States. They also employ "living off the land" methods and have compromised numerous Internet of Things (IoT) devices to form botnets. In September 2024, the U.S. government dismantled one such botnet, highlighting the pervasive threat they pose.
Salt Typhoon: Allegedly responsible for breaching U.S. telecommunications firms in October 2024, Salt Typhoon focuses on counterintelligence by gathering data on PRC targets under U.S. surveillance. They gained unprecedented access to sensitive cellular logs, including Call Detail Records (CDRs) containing detailed information about phone calls, messages, and user locations. The U.S. government has yet to officially confirm these attacks or the group's existence, adding layers of complexity to the attribution process.
Marie O'Leary, a cybersecurity analyst at the International Institute for Strategic Studies, remarked,
"The scale and audacity of the Salt Typhoon hacks suggest a new level of cyber espionage that could destabilize international relations. This isn't just an attack on the United States; it's a wake-up call for the international community about the vulnerabilities inherent in our interconnected digital infrastructure."
Government Response and Congressional Oversight
The U.S. Congressional Research Service has highlighted these breaches, raising critical questions about the adequacy of the federal response and the measures needed to protect critical infrastructure. Members of Congress from both the House and Senate have expressed deep concerns, calling on U.S. companies and federal agencies to provide detailed information about the incidents.
"Congress might also consider oversight of the executive branch’s response, particularly the immediate response and discovery of the incident," noted a recent report by cybersecurity expert Jaikaran.
"The incident raises concerns about the privacy of Americans’ communications, the security of critical infrastructure, and cybersecurity deterrence policy."
Jaikaran also emphasised the need for policymakers to focus on the roles of the Cyber Unified Coordination Group (UCG), the Cyber Safety Review Board (CSRB), Sector Risk Management Agencies (SRMAs), and preparedness activities. The Cyber UCG has been utilised in previous significant cyber events, such as the Microsoft Exchange services compromise in 2021 and the SolarWinds incident, to coordinate a whole-of-government response integrated with private sector efforts.
International Criticism and Competitive Tensions
Global leaders and cybersecurity experts have expressed grave concerns over the implications of these breaches. Dr. Alan Chen, a professor of international relations at Georgetown University, stated,
"Cybersecurity has become a pivotal issue in international politics, and incidents like these can influence public opinion and policy decisions. The perception of foreign interference, especially from a major competitor like China, adds a layer of complexity to the geopolitical landscape."
The breaches have reignited debates over the trade relationship between the U.S. and China. Economic analysts warn that continued cyber hostilities could spill over into the economic sphere, potentially leading to new trade barriers or tariffs. Lisa Martinez, an economist at the Brookings Institution, commented,
"Cyber espionage activities exacerbate distrust and could prompt retaliatory measures that impact global markets. Businesses are wary of the uncertainty this creates, especially in sectors heavily reliant on international supply chains."
Earlier this year, the U.S. Justice Department charged seven Chinese nationals with "conspiracy to commit computer intrusions and conspiracy to commit wire fraud." This announcement came on the heels of warnings from Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly and National Cyber Director Harry Coker about the strategic shift of Chinese hackers targeting critical infrastructure.
(CISA) Director Jen Easterly. Source: YouTube, Washington Post
The escalating cyber threats have prompted calls for enhanced preparedness. Jaikaran highlighted that Congress has repeatedly directed CISA to engage in explicit preparedness activities, such as planning and conducting exercises. These activities help stakeholders think through potential incidents, establish roles and responsibilities, understand capabilities, and develop a shared sense of actions and outcomes.
"CISA developed a cyber incident response plan at the end of the Obama Administration and is required to update that plan by the end of 2024," Jaikaran noted. "With regard to the communications sector, participation in preparedness efforts appears to be primarily focused on their role as an essential service to other sectors like energy and financial services."
Despite intelligence community warnings about adversaries' intent to target and disrupt the communications sector, the U.S. government's focus on the sector's inherent risks is not as evident. Congress may consider how CISA incorporates changes in the sector, federal organizations, and threat actors into preparedness activities and how lessons learned from past incidents are applied to future responses.
Outlook: Balancing Security and Stability Amidst Political Transition
As the United States navigates a period of political transition with the incoming administration in 2025, the cyber landscape faces new challenges. The "dust hasn't even settled yet" on the recent election results, and the new government has signalled a commitment to rebuilding the nation's technological and trade foundations. This strategic focus is expected to intensify economic competition and heighten political tensions on the global stage.
Diplomatic efforts, robust cybersecurity strategies, and international cooperation are essential to mitigate the risks. Marie O'Leary emphasized,
"In this interconnected world, cyber threats are a shared challenge. Our response must be collaborative, informed, and resolute to safeguard the future."
Experts caution that unilateral actions may exacerbate existing tensions. Dr. Alan Chen reflected,
"A strong national strategy is crucial, but it must be balanced with international collaboration to prevent further escalation."
Only through collective action and effective communication can the international community navigate this contested future successfully. Establishing norms and agreements to prevent cyber conflicts from escalating into broader crises is imperative for global security and economic stability.
A Chinese ship captain has been charged in Taiwan for deliberately damaging a subsea cable, marking a rare prosecution tied to infrastructure sabotage. The case highlights growing concerns over global undersea cable vulnerabilities amid rising tensions with China.
Australia is facing a double threat to its financial security: cyberattacks on major superannuation funds and the fallout from Trump’s “Liberation Day” tariff declaration. Both have exposed deep vulnerabilities in retirement savings, leaving Australia’s future wealth increasingly at risk.
The global data centre boom is faltering as credit risks, rising tariffs, and capital costs take hold. Valuations have dropped by as much as 40%, projects are being delayed or cancelled, and hyperscalers are stepping back from long term deals as the sector undergoes a major reset.
A coordinated cyberattack hit Australia’s largest pension funds, compromising over 20,000 accounts. Hackers targeted retirees for fraud, exploiting weak authentication. The breach exposed major gaps in super fund security and shook public trust in the $3.5T industry.