China is accelerating efforts to build encryption that can withstand future computing power. The push comes as experts warn that next-generation systems could break today’s widely used security methods. This shift reflects a growing urgency to protect sensitive data before current encryption becomes outdated. Post-Quantum Encryption Takes Priority China is investing in post-quantum cryptography, a…
Chinese authorities have reported a sharp rise in AI-driven cybercrime, warning that criminals increasingly use artificial intelligence to power online scams and digital fraud. Officials say the rapid spread of AI tools has made it easier for attackers to automate illegal activity and expand the scale of cybercrime operations. The warning comes from China’s latest…
A Chinese data leak has exposed billions of personal records after researchers discovered a massive unsecured database containing highly sensitive information. The dataset included national identification details, contact information, and account credentials linked to Chinese citizens. The scale of the exposure places it among the largest known data leaks ever identified. The incident highlights ongoing…
Chinese crypto money laundering operations have grown more organized and efficient, driven by the rise of specialized underground services. Among these, Black U services have emerged as a critical tool for moving illicit cryptocurrency at scale. These services allow criminals to convert tainted digital assets into usable funds with speed and reduced exposure. The expansion…
The China digital currency platform is gaining momentum as cross-border transaction volumes rise sharply. This growth signals increasing interest in payment systems that operate outside traditional U.S. dollar-based financial rails. Several central banks now view digital currency platforms as practical tools for modernizing international payments. Cross-border transactions surge rapidly mBridge enables direct digital currency settlements…
China’s military is accelerating its use of artificial intelligence through DeepSeek, an advanced large language model driving automation in defense. The China AI military effort focuses on integrating DeepSeek into robot dogs, drone swarms, and autonomous combat systems to redefine future warfare. The People’s Liberation Army (PLA) increasingly uses DeepSeek to shorten decision times and…
China-linked cyber actors exploit a sophisticated malware called Brickstorm to infiltrate F5 BIG-IP systems. This attack compromises over 250,000 devices globally, creating major risks for enterprise infrastructure. What Is Brickstorm? Brickstorm is a stealthy, self-contained backdoor malware linked to the China-nexus threat cluster UNC5221. It operates with minimal system dependencies, which makes detection and removal…
A massive Great Firewall leak has revealed how China exports advanced censorship and surveillance technologies worldwide. The breach exposed more than 500GB of internal documents, communications, and source code tied to Geedge Networks, a developer linked to China’s censorship systems. What the Leak Uncovered The files revealed tools like the Tiangou Secure Gateway (TSG), capable…