Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
News
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/71/5f/31/715f313f-084e-42bd-327e-7d63431cd335/mza_2028241703530818667.jpg/600x600bb.jpg
Dragon's Code: America Under Cyber Siege
Inception Point Ai
189 episodes
8 hours ago
This is your Dragon's Code: America Under Cyber Siege podcast.

Dragon's Code: America Under Cyber Siege is your go-to podcast for detailed analysis of the week's most sophisticated Chinese cyber operations targeting US infrastructure. Stay updated with expert insights into attack methodologies, affected systems, and compelling attribution evidence. Discover the defensive measures implemented and lessons learned from each incident. Featuring interviews with leading cybersecurity experts and government officials, Dragon's Code delivers essential information for anyone interested in the evolving landscape of cyber warfare and national security. Tune in regularly for in-depth discussions that keep you informed and prepared.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
RSS
All content for Dragon's Code: America Under Cyber Siege is the property of Inception Point Ai and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This is your Dragon's Code: America Under Cyber Siege podcast.

Dragon's Code: America Under Cyber Siege is your go-to podcast for detailed analysis of the week's most sophisticated Chinese cyber operations targeting US infrastructure. Stay updated with expert insights into attack methodologies, affected systems, and compelling attribution evidence. Discover the defensive measures implemented and lessons learned from each incident. Featuring interviews with leading cybersecurity experts and government officials, Dragon's Code delivers essential information for anyone interested in the evolving landscape of cyber warfare and national security. Tune in regularly for in-depth discussions that keep you informed and prepared.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs
Show more...
Technology
News,
Politics,
Tech News
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/1993d8e873b0ec84325acb9efc035b9f.jpg
Chinese Crews Go Deep: Malware Pre-Positioned Across US Infrastructure for Instant Chaos
Dragon's Code: America Under Cyber Siege
3 minutes
1 month ago
Chinese Crews Go Deep: Malware Pre-Positioned Across US Infrastructure for Instant Chaos
This is your Dragon's Code: America Under Cyber Siege podcast.

Name’s Ting. Let’s jack straight into Dragon’s Code: America Under Cyber Siege.

This week, the Chinese state-aligned crews didn’t go loud, they went deep. At Cyber Week 2025 in Tel Aviv, CISA executive assistant director Nick Anderson told listeners that Chinese operators have already pre-positioned malware across U.S. water utilities, regional power grids, telecom backbones, cloud platforms, and even identity systems, all designed to sit dormant until a Taiwan or South China Sea crisis flips the “go” switch. According to Anderson, this is no longer classic espionage; it’s battlespace prep for instant chaos in daily American life.

Check Point’s new report “Threats to the Homeland: Cyber Operations Targeting US Government and Critical Infrastructure” backs that up, showing that roughly a third of nation‑state incidents hitting U.S. critical infrastructure since 2024 involved energy entities, with Chinese-linked “strategic access actors” burrowing into industrial control systems and SCADA environments. Their tradecraft is textbook China: living off the land, abusing identity, exploiting zero‑days, and riding supply-chain and managed service providers so they can pivot from a single compromised vendor into multiple utilities at once.

On the ground, utilities are discovering suspicious traffic paths flowing through Chinese‑made solar inverters and grid electronics. The Washington Post and The Independent, citing Strider Technologies, recently highlighted that about 85 percent of surveyed U.S. utilities rely on inverters tied to Chinese state-linked firms, and Reuters reporting described “rogue communication devices” in some units that could bypass firewalls and provide remote access into grid segments. One unnamed U.S. official put it bluntly: you don’t have to take down the entire Western Interconnection to panic America; a handful of synchronized blackouts will do.

Attribution is coming from a stack of signals: shared infrastructure and tooling with known Ministry of State Security clusters, overlaps with groups like Salt Typhoon that previously compromised at least nine U.S. telecoms, and telemetry from companies such as Check Point and other major threat intel shops showing the same Chinese nexus infrastructure re-used across energy, transport, and government networks. Beijing, for the record, calls all of this “groundless smears,” but the forensics, as my fellow nerds at CrowdStrike like to say, do not care about press statements.

Defenders aren’t standing still. CISA is pushing infrastructure operators to crank up logging and telemetry across OT and cloud identity, shift to secure‑by‑design architectures, and hunt proactively for China-linked pre‑positioning tools instead of waiting for alarms. Major utilities are segmenting OT from IT, ripping and replacing the riskiest foreign‑made inverters, and pressure is building in Congress for tighter procurement rules and mandatory reporting for critical infrastructure incidents.

The lessons this week? First, China isn’t just stealing data; it’s wiring in options for coercion. Second, identity and supply chain are the new front doors. And third, if you’re running water, power, or telecom in America and you still think you’re “too small to target,” congratulations, you are exactly the quiet little node a strategic access actor wants to own.

I’m Ting, thanks for tuning in, and don’t forget to subscribe. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Dragon's Code: America Under Cyber Siege
This is your Dragon's Code: America Under Cyber Siege podcast.

Dragon's Code: America Under Cyber Siege is your go-to podcast for detailed analysis of the week's most sophisticated Chinese cyber operations targeting US infrastructure. Stay updated with expert insights into attack methodologies, affected systems, and compelling attribution evidence. Discover the defensive measures implemented and lessons learned from each incident. Featuring interviews with leading cybersecurity experts and government officials, Dragon's Code delivers essential information for anyone interested in the evolving landscape of cyber warfare and national security. Tune in regularly for in-depth discussions that keep you informed and prepared.

For more info go to

https://www.quietplease.ai

Check out these deals https://amzn.to/48MZPjs