『Dragon's Code: America Under Cyber Siege』のカバーアート

Dragon's Code: America Under Cyber Siege

Dragon's Code: America Under Cyber Siege

著者: Quiet. Please
無料で聴く

このコンテンツについて

This is your Dragon's Code: America Under Cyber Siege podcast.

Dragon's Code: America Under Cyber Siege is your go-to podcast for detailed analysis of the week's most sophisticated Chinese cyber operations targeting US infrastructure. Stay updated with expert insights into attack methodologies, affected systems, and compelling attribution evidence. Discover the defensive measures implemented and lessons learned from each incident. Featuring interviews with leading cybersecurity experts and government officials, Dragon's Code delivers essential information for anyone interested in the evolving landscape of cyber warfare and national security. Tune in regularly for in-depth discussions that keep you informed and prepared.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjsCopyright 2024 Quiet. Please
政治・政府 政治学
エピソード
  • Salt Typhoon Strikes Again Chinese Hackers Breach US Telecoms and Viasat in Cyber Espionage Frenzy
    2025/07/14
    This is your Dragon's Code: America Under Cyber Siege podcast.

    Hey there, folks I'm Ting, and I'm here to give you the lowdown on the latest in cyber warfare. This week has been a wild ride, especially with China's sophisticated cyber operations targeting US infrastructure. Let's dive right in.

    One of the most notable attacks comes from the Chinese hacking group Salt Typhoon. They've been active since at least 2019 and have been hammering US telecom networks, including a recent breach at Viasat, a major satellite broadband provider. Salt Typhoon's modus operandi is espionage, using unpatched Cisco devices to gain access to critical systems. According to reports, they've accessed US law enforcement wiretap systems and communications of select government officials.

    Experts like Jen Easterly, the former director of CISA, emphasize that China's cyber program is a serious threat to US critical infrastructure. These attacks are focused, diligent, patient, stealthy, and highly organized, making them a formidable foe. The US government has been working to enhance its cyber defenses, but there's still a lot of work to be done.

    On the flip side, the Trump administration has announced plans to spend $1 billion on offensive cyber operations. This move comes as cybersecurity experts warn that expanding U.S. government hacking could invite retaliation against vulnerable targets like local governments and private companies. Sen. Ron Wyden has expressed concerns about cuts to defensive cybersecurity programs, saying it leaves the country open to attack.

    In terms of defensive measures, the White House has issued an executive order pushing for "rules as code" to enhance cybersecurity governance. This means organizations will need to automate compliance and risk management using machine-readable policies.

    As we navigate these complex threats, it's clear that collaboration and innovation are key. Whether it's protecting against Salt Typhoon or bolstering our cyber defenses, staying ahead of the game is crucial.

    Thanks for tuning in, folks If you want more insights like these, be sure to subscribe. This has been a quiet please production, for more check out quiet please dot ai.

    For more http://www.quietplease.ai


    Get the best deals https://amzn.to/3ODvOta
    続きを読む 一部表示
    2 分
  • China's Hacker Extradited: Silk Typhoon Takedown Sends Shockwaves Through Cyber Underworld
    2025/07/13
    This is your Dragon's Code: America Under Cyber Siege podcast.

    Listeners, it’s Ting here, your favorite China-and-cyber-know-it-all, and I hope you’re ready because this past week has been pure Dragon’s Code: America Under Cyber Siege—no Hollywood CGI required.

    Let’s get right to it. The FBI’s international cyber dragnet nailed Zewei Xu, a 33-year-old Chinese hacker tied to the notorious Silk Typhoon—yep, that’s Hafnium for the cyber sleuths out there. Xu got nabbed at Milan’s airport, fresh off a flight from China, thanks to a U.S. warrant and some impressive Italian police work. U.S. authorities allege Silk Typhoon orchestrated huge espionage campaigns: think hacking COVID-19 vaccine research at the University of Texas, mass phishing that swept up thousands of inboxes, and vacuuming up policy secrets and IP from the bowels of government networks. If extradited, Xu’s looking at decades in U.S. prison, and the message is loud—cyber crooks can run, but the world’s gotten smaller for them.

    The method of attack? Expert-level spearphishing, zero-day exploits, and weaponized open-source tools, often disguised as “legit” VPNs or productivity apps uploaded to places as trusted as GitHub. One scheme this week: a so-called free VPN actually siphoned browser cookies, social media creds, and even banking logins straight to command servers in China. Meanwhile, the U.S. Department of Justice took down a "bulletproof" hosting provider known for sheltering ransomware and phishing operations—an attack enabler, now missing in action.

    Critical infrastructure got plenty of unwanted attention too. Suspected Chinese operatives are believed to have breached email accounts at one of DC’s most powerful law firms, with implications for everything from policy lobbying to energy deals. According to the Atlantic Council’s tech team, these kinds of intrusions make clear that small and medium U.S. businesses remain juicy, soft targets, and our information sharing network needs a serious bandwidth upgrade.

    Defensively, agencies moved fast. The Cybersecurity and Infrastructure Security Agency (CISA) added a slew of new vulnerabilities—think Multi-Router Looking Glass, Rails, and Zimbra—to its Known Exploited Vulnerabilities list, forcing emergency patch cycles nationwide. Microsoft’s Patch Tuesday addressed a whopping 130 flaws, with OT/IT teams merging their operations for unified defense. The Secret Service’s operational failures during last summer’s attempt on President Trump (remember that?) became a rallying cry—if your comms and monitoring tech is old, you’re basically opening the door for attackers.

    Expert consensus, from folks like former CISA Director Chris Krebs, is that the U.S. needs more threat hunters and red teamers, not less. The GAO and cybersecurity boardrooms are finally talking risk management in plain language, giving CISOs direct accountability over both digital and operational technology. If your board doesn’t have a cyber expert yet, they’re running out of excuses.

    Biggest lesson? You can’t treat cyber as just a technical issue—it’s governance, it’s investment, and it’s strategy. And in this new era, every takedown, every arrest, every patch buys a little breathing room, but vigilance never sleeps.

    Thanks for tuning in, listeners—be sure to subscribe and pass this on to anyone who still thinks cybersecurity is somebody else’s problem. This has been a quiet please production, for more check out quiet please dot ai.

    For more http://www.quietplease.ai


    Get the best deals https://amzn.to/3ODvOta
    続きを読む 一部表示
    3 分
  • Cyber Siege! China Hacks Telcos, Steals Wiretaps & Secrets
    2025/07/11
    This is your Dragon's Code: America Under Cyber Siege podcast.

    You know it’s been a weird week when your morning coffee is interrupted by General Timothy Haugh from the NSA sounding the cyber-siege alarm—again. In the last few days, Dragon’s Code was very much alive as Chinese cyber operatives dialed up the sophistication in their attacks on US infrastructure. I’m Ting, your favorite China-and-cyber connoisseur, with the scoop on America’s digital battlefield.

    The highlight? According to The Wall Street Journal, hackers linked to China managed to penetrate AT&T, Verizon, and Lumen Technologies. The suspected prize: not just customer data, but actual wiretap warrant requests—a move straight out of a cyber-thriller. Timothy Haugh confirmed these investigations are fresh, with national security agencies collaborating closely with partners like Microsoft and Mandiant. Attribution here comes from digital forensics, command-and-control infrastructure analysis, and telltale malware usage that screams “Beijing’s in the house.” Of course, the Chinese Embassy denies everything and accuses the US of “politicizing cybersecurity issues”—because what else do you say when caught red-handed?

    Attack methodology? Let’s geek out for a second. These incursions don’t just involve old-school phishing—though, let me tell you, Check Point Research spotted a 4000% surge in phishing since generative AI hit the scene. But this week’s headline acts leaned heavily on exploiting zero-day flaws in border devices, abusing remote access, and dropping custom payloads designed specifically to avoid detection. The hackers went after telco backbone systems, giving them access not just to metadata, but the communications most folks assume are untouchable. Some experts, including those from Mandiant, call this “access-as-power”—where stealing data is just the warm-up act for sabotage or strategic intelligence collection.

    On defense, CISA and DHS have been hustling. They ramped up cross-sector threat sharing—thank you, CISA 2015, though Congress is cutting it close with reauthorization!—and pushed new rapid-response protocols for telecoms, requiring segmented networks and AI-driven anomaly detection. Oh, and in case you missed it, OpenAI just signed a $200 million deal with the DoD to throw some artificial intelligence muscle into America’s cyber shield. FCC chair Jessica Rosenworcel reminded everyone that old-school rules are useless against these new threats, and Congress held marathon hearings pressing agencies on their readiness.

    Experts agree the main lesson is bitter but clear: infrastructure is only as strong as its weakest digital link. “China’s cyberspace workforce is the world’s largest,” said General Haugh—think: techies with government budgets and diplomatic cover. The only way to keep up? Total public-private teamwork, regulatory gloves off, and vigilance everywhere from the cloud to the undersea cables connecting Taiwan and beyond. The bipartisan Taiwan Undersea Cable Resilience Initiative Act is just the latest example of how seriously lawmakers are taking hybrid Chinese threats on infrastructure.

    That’s it for this week in the Dragon’s Code saga! Ting signing off—thanks for tuning in, don’t forget to subscribe, and remember: this has been a Quiet Please production, for more check out quietplease dot ai.

    For more http://www.quietplease.ai


    Get the best deals https://amzn.to/3ODvOta
    続きを読む 一部表示
    3 分

Dragon's Code: America Under Cyber Siegeに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。