This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, Ting here, your go-to gal for all things China cyber chaos and hacker hijinks. Buckle up, because this past week, America's infrastructure got hit with Dragon's Code—a slick Chinese cyber siege that's got the stars and stripes scrambling. Picture this: I'm hunkered down in my digital lair, caffeine-fueled, dissecting the feeds as Silk Typhoon, that notorious Beijing-backed crew, ramps up their game. It kicked off with BeyondTrust Remote Support getting pwned via CVE-2026-1731, a nasty OS command injection flaw letting unauthenticated attackers run wild—no login needed. BleepingComputer reports attackers exploited it for remote code execution, risking data exfiltration and total system compromise on over 11,000 exposed instances, mostly on-prem setups. Hacktron spotted it first on January 31, and watchTowr's Ryan Dewhurst confirmed active exploits by Thursday. CISA slapped it on their Known Exploited Vulnerabilities catalog, BOD 22-01 ordering feds to patch by end of day Monday—talk about a three-day panic button. This ain't isolated; it's Dragon's Code redux. Remember Salt Typhoon owning US telcos under the Clean Network policy? Now Silk Typhoon's back, hitting Treasury, OFAC, and CFIUS with zero-days like CVE-2024-12356 two years ago, snagging API keys for 17 SaaS breaches. Methodologies? Stealthy command injections, zero-days, API hijacks—pure supply chain sorcery targeting remote access tools in critical infra. Affected systems: privileged remote access for Fortune 100, feds, telcos—your power grids, finance, sanctions enforcers on the line. Attribution? Ironclad. CISA links it to Silk Typhoon's playbook; Google's Threat Intelligence Group calls China the top cyber threat by volume, hitting defense suppliers and drones. The Register nods to past telco owns, while ASPI's strategists slam unnamed actors as a trust-killer—Palo Alto wimped out on naming China, but Google didn't. Defenses? BeyondTrust auto-patched SaaS on February 2; on-prem admins, manual hustle or bust. CISA's yelling mitigations now, but with DHS shutdown slashing them to 38% staff per SecurityWeek, it's skeleton crew central. Lessons? Ryan Dewhurst says assume unpatched is owned—patch fast, segment networks, ditch outdated remote tools. Experts like Ian Bremmer at Munich Security Conference warn US-China AI/cyber has zero trust, no governance, just escalation. Governments must name and shame Beijing, per ASPI, to pressure fixes and inform us plebs. Witty aside: China's fusing civil-military cyber like a bad fusion cuisine, stealing IP while we dither on bans—Reuters whispers Trump might lift TP-Link and telco restrictions for Xi talks. But listeners, vigilance is our firewall. Stay patched, diversify chains, demand sovereign stacks. Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI