
The Lawfare Podcast
The i-Soon Leaks with Winnona DeSombre Bernsen
Mar 5, 2024
A Chinese cybersecurity firm's data leak reveals hacking methods, tools, and victims, highlighting similarities with U.S. firms. Discussion on vulnerability hoarding, contracting challenges, and developing cybersecurity norms. Exploring Chinese vs. U.S. cyber industries, government involvement, and implications for national security.
37:17
Episode guests
AI Summary
AI Chapters
Episode notes
Podcast summary created with Snipd AI
Quick takeaways
- Chinese cybersecurity firm ISUN's leaked documents expose hacking methods and relationships between Chinese and US cyber industries.
- Comparing Chinese and Western cybersecurity firms reveals similarities in corporate ecosystems and challenges faced in governmental contracting.
Deep dives
Chinese Cybersecurity Firm's Massive Data Leak Reveals Operations and Similarities with Western Counterparts
Premier Chinese vulnerability researchers and international vulnerability researchers showcased that they could breach top Western tech during the Tamfukup competition in China. The discovered vulnerabilities don't receive immediate patches; instead, they are shared with the Chinese government first. The leaks from the Chinese cybersecurity firm ISUN unveiled internal workings, hacking methods, and relationships between Chinese and US offensive cyber industries.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.