What are the latest sticking points in US-China tensions?

The article explores the current key issues fueling tensions between the United States and China as of October 2025. It highlights the geopolitical, economic, and technological disputes that continue to challenge the bilateral relationship. Key sticking points include trade disagreements, technology competition, military presence in the Asia-Pacific region, and human rights concerns. The article also discusses the impact of these tensions on global markets and international diplomacy. For cybersecurity professionals, understanding these dynamics is crucial as state-sponsored cyber activities and espionage often correlate with geopolitical conflicts. The US-China rivalry influences cyber defense strategies, threat intelligence priorities, and international cooperation frameworks. This comprehensive analysis provides insights into how these geopolitical tensions shape the cybersecurity landscape, emphasizing the importance of vigilance and adaptive security measures in a rapidly evolving threat environment.

This Cyber News was published on www.reuters.com. Publication date: Sun, 12 Oct 2025 20:14:03 +0000


Cyber News related to What are the latest sticking points in US-China tensions?

What are the latest sticking points in US-China tensions? - The article explores the current key issues fueling tensions between the United States and China as of October 2025. It highlights the geopolitical, economic, and technological disputes that continue to challenge the bilateral relationship. Key ...
1 day ago Reuters.com
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
2 years ago Securityweek.com
European firms urge China to give more clarity on data transfer laws - AP Moeller - Maersk A/S Siemens AG BEIJING, Nov 15 - European firms "Urgently" need China to give clearer definitions of key terms in its cross-border data transfer rules, a European business lobby group said on Wednesday, warning firms also stood to ...
1 year ago Reuters.com
How 'Big 4' Nations' Cyber Capabilities Threaten the West - COMMENTARY. There are four nations deemed by the US and UK governments to pose the greatest threat to the West. Russia's cyber-threat activities are primarily focused on offensive cyber operations, China's are focused on cyber espionage, Iran's on ...
1 year ago Darkreading.com
CVE-2022-30426 - There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow ...
3 years ago
US House 'Asks Intel, Nvidia, Micron CEOs' To Testify On China - US House of Representatives China committee asks chief executives of Intel, Nvidia, Micron to testify as international tensions mount. The chief executives of Intel, Nvidia and Micron have been asked to testify before the US House of Representatives' ...
1 year ago Silicon.co.uk
US Officials To Visit Taiwan To 'Explain' China Chip Controls - Taiwan government says US officials to visit island next month to explain complex chip sanctions aimed at China, amidst rising tensions. US officials are planning to visit Taiwan to explain the details of new export controls aimed at preventing ...
1 year ago Silicon.co.uk
Uncovering Chinas Surveillance of the United States Spies Hackers and Informants - Last week, a Chinese surveillance balloon in the United States caused a diplomatic uproar and raised concerns about how Beijing collects intelligence on its biggest rival. FBI Director Christopher Wray said in 2020 that Chinese spying is the most ...
2 years ago Securityweek.com Silence
China's Dogged Campaign to Portray Itself as Victim of US Hacking - For more than two years, China's government has been attempting to portray the US as indulging in the same kind of cyber espionage and intrusion activities as the latter has accused of carrying out over the past several years. A recent examination of ...
1 year ago Darkreading.com Volt Typhoon
Stifling Beijing in cyberspace big focus for UK operatives The Register - Regular attendees of CYBERUK, the annual conference hosted by British intelligence unit the National Cyber Security Centre, will know that in addition to the expected conference panels, there is usually an interwoven theme to proceedings. Various ...
1 year ago Theregister.com APT3 Volt Typhoon
China Investigating Alleged Use of Surveillance Balloon in US - China declared on Friday that it is looking into reports that a Chinese spy balloon has been flying in U.S. airspace and asked for people to remain calm. The Foreign Ministry spokesperson Mao Ning also said that China has no intention of infringing ...
2 years ago Securityweek.com
Pro-China campaign targeted YouTube with AI avatars The Register - Think tank Australian Strategic Policy Institute last week published details of a campaign that spreads English language pro-China and anti-US narratives on YouTube. The campaign, which ASPI calls Shadow Play, includes 30 YouTube channels that have ...
1 year ago Go.theregister.com Rocke
Big China Spy Balloon Moving East Over US, Pentagon Says - The Pentagon said at midday Friday that a Chinese spy balloon had moved eastward and was over the central United States, and that the U.S. rejected China's claims that it was not being used for surveillance. Gen. Pat Ryder, Pentagon press secretary, ...
2 years ago Securityweek.com
A top-secret Chinese spy satellite just launched on a supersized rocket - China's largest rocket apparently wasn't big enough to launch the country's newest spy satellite, so engineers gave the rocket an upgrade. The Long March 5 launcher flew with a payload fairing some 20 feet taller than its usual nose cone when it took ...
1 year ago Packetstormsecurity.com Rocke
CVE-2018-0250 - A vulnerability in Central Web Authentication (CWA) with FlexConnect Access Points (APs) for Cisco Aironet 1560, 1810, 1810w, 1815, 1830, 1850, 2800, and 3800 Series APs could allow an authenticated, adjacent attacker to bypass a configured ...
6 years ago
Beijing fosters foreign influencers to spread its propaganda The Register - China is offering foreign influencers access to its vast market in return for content that sings its praises and helps to spreads Beijing's desired narratives more widely around the world, according to think tank the Australian Strategic Policy ...
1 year ago Theregister.com
TikTok fined €530 million for sending European user data to China - The Irish Data Protection Commission (DPC) has fined TikTok €530 million (over $601 million) for illegally transferring the personal data of users in the European Economic Area (EEA) to China, violating the European Union's GDPR data protection ...
5 months ago Bleepingcomputer.com
Bribed US Navy sailor sold secrets to China for just $14k The Register - A US Naval sailor will face more than two years behind bars after pleading guilty to taking bribes from Chinese spies in exchange for sensitive military information. Wenheng Zhao, 26, also known as Thomas Zhao, was sentenced on January 8 to 27 months ...
1 year ago Packetstormsecurity.com
Apple Move iPad Engineering To Vietnam - Fresh reports of Apple shifting manufacturing from China, with iPad product development resources relocated to Vietnam. Apple continues to strengthen its manufacturing and development capabilities outside of mainland China, according to recent media ...
1 year ago Silicon.co.uk
Made in China: How China’s Surveillance Industry Actually Works - China's surveillance industry is a vast and complex ecosystem that integrates cutting-edge technology with state-driven objectives to monitor and control populations. This article explores the inner workings of this industry, revealing how Chinese ...
1 month ago Wired.com
China Issues Warning About Theft of Military Geographic Data in Data Breaches - China issued a cautionary notice regarding the utilization of foreign geographic software due to the discovery of leaked information concerning its critical infrastructure and military. Prompted by this revelation, the Chinese government has called ...
1 year ago Cysecurity.news
Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked - Pwn2Own Day 1 - Sina Kheirkhah (@SinSinology) of Summoning Team and Viettel Cyber Security (@vcslab) both demonstrated successful exploits, each earning $15,000 and 1.5 Master of Pwn points despite the vendor’s prior knowledge of the vulnerabilities. Red Hat Linux ...
4 months ago Cybersecuritynews.com
China plans to take 'hack-proof' quantum satellite technology to new heights - China is planning new, cutting-edge quantum communications satellites. China launched the first dedicated quantum communications satellite, named Micius, in 2016, and has been quietly working on followup missions in the years since. "Low Earth orbit ...
1 year ago Space.com Rocke
Taiwan defence report warns of increased threat from China by 2025 - A recent Taiwan defence report highlights a significant escalation in the military threat posed by China, projecting increased risks by the year 2025. The report underscores China's rapid military modernization and expansion, which includes ...
4 days ago Reuters.com
National Grid pulls Chinese kit over cybersecurity concerns The Register - The National Grid is reportedly the latest organization in the UK to begin pulling China-manufactured equipment from its network over cybersecurity fears. The contract with the UK subsidiary of China's state-owned Nari Technology, NR Electric UK, was ...
1 year ago Go.theregister.com

Cyber Trends (last 7 days)