Dragon's Code: America Under Cyber Siege

Inception Point Ai

This is your Dragon's Code: America Under Cyber Siege podcast. Dragon's Code: America Under Cyber Siege is your go-to podcast for detailed analysis of the week's most sophisticated Chinese cyber operations targeting US infrastructure. Stay updated with expert insights into attack methodologies, affected systems, and compelling attribution evidence. Discover the defensive measures implemented and lessons learned from each incident. Featuring interviews with leading cybersecurity experts and government officials, Dragon's Code delivers essential information for anyone interested in the evolving landscape of cyber warfare and national security. Tune in regularly for in-depth discussions that keep you informed and prepared. For more info go to https://www.quietplease.ai Check out these deals https://amzn.to/48MZPjs

  1. 1D AGO

    Dragons Dont Breathe Fire Anymore They Code It: Beijings Zero-Day Siege on US Defense Contractors

    This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos, and buckle up because this past week, America's defense industrial base got hit with Dragon's Code—a relentless cyber siege straight from Beijing's playbook. Picture this: I'm huddled over my screens on February 11, 2026, watching Google Threat Intelligence Group drop their bombshell report, flagging China-nexus crews like UNC3886 and UNC5221 as the undisputed volume kings of espionage hacks against U.S. contractors. These sneaky operators kicked off intrusions by zero-daying over two dozen unknown flaws in edge devices—think routers, firewalls, and IoT gadgets from Honeywell and Siemens—slipping past firewalls into supply chains for unmanned aircraft systems and aerospace R&D. Google Threat Intelligence Group details how they exploited these weak points for initial access, pivoting to steal blueprints on next-gen drones and battlefield tech, all while masking as legit traffic via ORB networks. Affected systems? IT networks at Boeing suppliers, Lockheed Martin subs, and even dual-use manufacturers churning out components for F-35 jets. Attribution? Crystal clear from GTIG's two-year analysis: IP traces, TTPs matching PLA Unit 61398 alumni, and leaked Expedition Cloud docs reviewed by Recorded Future News, showing Beijing rehearsing identical attacks on replicas of U.S.-style critical infra. These files spilled source code for "South China Sea drills," prepping takedowns of power grids and telcos—now aimed at our grids too, per CISA's acting chief warning of China targeting U.S. networks amid staff shortages. Defenses? Singapore's Cyber Security Agency and IMDA just crushed UNC3886's assault on Singtel, M1, StarHub, and SIMBA Telecom with Operation Cyber Guardian—multi-agency takedowns isolating edge vulns and deploying AI anomaly hunters. Stateside, GTIG urges proactive threat hunting: segment OT from IT, patch edges religiously, and hunt for DKnife, Cisco Talos-attributed Chinese toolkit hijacking router traffic for credential theft since 2019. Lessons? Cybersecurity guru Mandiant chimes in: China's tradecraft evolved—personal email phishing at Raytheon staff, per GTIG, blending social engineering with zero-days. DHS officials fret reimbursements delays could hobble responses, as FCW reports 70 CISA staff reassigned. Experts like those at Ankura CTIX say surge resilient arches now, or wartime production craters from ransomware bleed-over. Witty wrap: Dragons don't breathe fire anymore; they code it. Stay vigilant, patch those edges, and laugh in binary at Beijing's siege. Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  2. 3D AGO

    Chinas Volt Typhoon Hackers Are Stalking Guam and Your Power Grid Like Digital Moles on Steroids

    This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos, and buckle up because America's infrastructure is under Dragon's Code siege right now. Picture this: it's early February 2026, and Volt Typhoon—that sneaky China-linked APT crew—has burrowed deeper into US critical networks like a digital mole on steroids. According to the International Institute for Strategic Studies, or IISS, these hackers aren't just spying; they're pre-positioning for disruption, targeting comms, energy, transportation, and government systems, especially around Guam's naval ports and air bases. Why Guam? It's the launchpad for any US response to a Taiwan blockade. John Bruce from IISS nails it: they've snagged network diagrams and OT manuals from low-intel-value spots, proving it's sabotage prep, not just espionage. Their toolkit? Pure genius—'living off the land' tricks, hijacking legit admin tools for maintenance and privilege escalation, blending right in like a ninja in a crowd. They even botnet nearby SOHO routers, firewalls, and VPNs to mask traffic as local chit-chat. Defenders are scrambling: CISA's Binding Operational Directive 26-02 demands federal agencies ditch all end-of-support edge devices in 12 months, 'cause nation-states love exploiting those rusty relics. Meanwhile, the House Energy Subcommittee just advanced five bills, including the SECURE Grid Act from Rep. Doris Matsui and ETAC reauthorization pushed by Rep. Lori Trahan, targeting China threats like Volt and Salt Typhoon in electric grids. These pump DOE funds into info-sharing, threat assessments at the National Lab of the Rockies, and workforce training to fortify the grid against blackouts. FBI's Operation Winter Shield has Brett Leatherman warning healthcare's a prime pivot point—PRC hackers leap from trusted US IPs to hospitals, grids, and finance via supply chain weak spots. Attribution? Crystal: low intel targets, Guam focus, and leaked docs show China rehearsing neighbor infra hits on secret platforms. Lessons? Monitor every admin tool 24/7, vet third-parties ruthlessly, and push back with 'defend forward' from the 2018 Cyber Strategy. Experts like Bruce say Volt Typhoon redraws cyber norms, challenging UN Norm 13(f) on critical infrastructure, forcing the West to rethink voluntary rules versus China's push for binding treaties. It's asymmetric warfare, listeners—China's signaling "don't mess with Taiwan or the South China Sea," eroding our edge. But with bills like AI Overwatch Act eyeing chip exports, we're counterpunching. Stay vigilant; patch those edges! Thanks for tuning in, smash that subscribe button for more cyber spice. This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    3 min
  3. 4D AGO

    Chinas Cyber Ninjas Just Ghosted 70 Countries and Hacked Your Notepad Plus Plus While You Slept

    This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, Ting here, your go-to cyber sleuth with a front-row seat to China's digital dragonfire. Picture this: it's been a wild week ending February 8, 2026, and America's infrastructure is feeling the heat from the most slick Chinese cyber ops yet. I'm talking Shadow Campaigns, that beast tracked by Palo Alto Networks Unit 42, where state-sponsored hackers—likely UNC6619 out of GMT+8 timezone—breached 70 government networks across 37 countries, including US allies' power grids and border systems. These ninjas kicked off with phishing lures themed around ministry shakeups, dropping Diaoyu malware loaders from Mega.nz archives. Once in, ShadowGuard rootkit takes over Linux kernels, hiding files, spoofing syscalls, and ghosting processes like a pro. Affected systems? Brazil's Ministry of Mines and Energy, Mexican ministries, even Venezuelan tech facilities—scanning spiked during the US gov shutdown in October 2025 and Honduras' election prep. US power equipment and aviation got eyes on them too, perfect for espionage on trade policies and nukes. Attribution screams China: Asia-based ops, South China Sea focus on Indonesia, Thailand, Vietnam, per Unit 42's deep dive. Then there's Lotus Blossom, the old fox since 2009, hitting Notepad++'s update server via Hostinger compromise from June to December 2025. Developer Don Ho confirmed selective backdoors for East Asia watchers—Rapid7 nailed it as Chinese-linked, targeting gov, telecom, aviation. CISA's on it, probing US gov exposure. Don't sleep on DKnife, Cisco Talos' router nightmare active since 2019 through January 2026. This adversary-in-the-middle toolkit hijacks WeChat creds, Chinese taxi apps, spreading ShadowPad via edge devices—high-confidence China nexus, linked to WizardNet hits in Philippines and UAE. Defenses? CISA mandates 72-hour incident reports for critical infra, per recent rules. Palo Alto notified victims, shared IOCs like SSH from US/Singapore VPS and Tor relays. Experts like Kevin Beaumont spotted three East Asia orgs hit via Notepad++. Lessons? Patch routers, monitor kernel tweaks, ditch weak SSH—persistence beats zero-days. Randall Schriver from US-China Economic and Security Review Commission warns Pacific cables are next, dual-use ports in Solomon Islands fueling debt diplomacy near Guam. Government officials like Thomas DiNanno call out China's sneaky nuke tests too—cyber's just the opener. Witty takeaway, listeners: China's playing 5D checkers while we're on chessboard defense. Layer up with Coast Guard pivots and intel shines, as Kuiken urges. Thanks for tuning in, smash that subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    3 min
  4. 6D AGO

    Ting Spills Tea: Chinese Hackers Turn US Networks Into Their Personal Buffet While We All Panic

    This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacker hijinks. Picture this: it's been a wild week in the cyber trenches, with America's infrastructure feeling the heat from some seriously slick Chinese ops. Let's dive into Dragon's Code: America Under Cyber Siege, straight from the headlines scorching up February 2026. First off, Salt Typhoon—that notorious Chinese state-backed crew—didn't just knock; they kicked down doors. Norway's Police Security Service dropped a bombshell on February 6, confirming Salt Typhoon hacked into Norwegian orgs via vulnerable network devices like routers and firewalls, pure espionage gold. But here's the gut punch: these same hackers have been burrowing into U.S. telecom giants for months, slurping up calls and texts from top politicians, as U.S. officials called it an "epoch-defining threat." Method? Zero-days in Cisco gear, persistent malware that laughs at reboots, straight out of CISA's nightmare BOD 26-02 playbook. Not stopping there, Palo Alto Networks' Unit 42 unveiled TGR-STA-1030 on February 6—a shadowy Asian squad, reeking of Chinese vibes with their Behinder web shells, Godzilla tools, and that sneaky ShadowGuard eBPF rootkit hiding files like "swsecret." Since January 2024, they've phished with Diaoyu Loader ZIPs from MEGA.nz, exploiting N-days in Microsoft, SAP, Atlassian—you name it—then dropping Cobalt Strike, Havoc, and Sliver for C2. Breached 70 entities in 37 countries, including U.S.-linked finance ministries and border control; reconned 155 nations in late 2025, spiking before Honduras elections and Mexico trade talks. GMT+8 hours, regional tools? Classic Beijing playbook. Defenses? FBI fired back February 5 with Operation Winter SHIELD—ten badass recs like phishing-resistant auth, vuln management, ditching EOL gear, and slashing admin privs. CISA's giving feds 18 months to purge unsupported edge devices, echoing Salt Typhoon exploits. Experts like Unit 42's crew warn of long-term intel hauls, urging segmentation and logging. Lessons? Patch fast, segment networks, test IR plans—China's not thieving data anymore; they're embedding for doomsday flips, per Vision Times on their 210 hacker units eyeing Taiwan-style sieges. Witty wrap: these ops are like digital dim sum—small bites now, feast later. Stay vigilant, listeners! Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    3 min
  5. FEB 4

    Dragon's Code Exposed: China's Hackers Nearly Blacked Out San Fran and Poisoned NYC Water This Week

    This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, Ting here, your go-to gal for all things China cyber chaos. Picture this: it's been a wild week ending February 4, 2026, and America's infrastructure is under the dragon's fiery breath with Operation Dragon's Code—a slick Chinese cyber siege that's got everyone from the White House to your local power grid sweating. I'm talking APT41, that notorious Beijing-backed crew out of Chengdu, unleashing their most devious hits yet on US critical systems. It kicked off Monday with a zero-day exploit in Siemens SCADA software targeting California's power utilities. These hackers, linked straight to China's Ministry of State Security via leaked WeChat chats and IP traces from FireEye's Mandiant team, slipped in through unpatched Edge routers. Boom—remote code execution let them manipulate substation controls, nearly blacking out San Francisco for hours. According to CrowdStrike's latest threat report, they used custom malware called ShadowDragon, a polymorphic beast that evades EDR tools by morphing every 30 seconds. By Tuesday, the action shifted to New York City's water treatment plants in the Croton system. Same playbook: spear-phishing execs at Veolia with fake invoices laced with Cobalt Strike beacons. Once inside, they pivoted to OT networks, tampering with chlorine dosing algorithms. CISA's emergency directive confirmed it—pH levels spiked to dangerous 9.2, risking contamination for millions. Attribution? Solid gold from Microsoft's Threat Intelligence: command-and-control servers hosted on Alibaba Cloud, with code signatures matching PLA Unit 61398's playbook from the 2023 SolarWinds rerun. Midweek, Wednesday hit transportation hard. Norfolk Southern rail hubs in Atlanta went haywire from a supply-chain attack on their GE Transportation signaling firmware. Trains halted across the Southeast; hackers injected false track data, mimicking a derailment setup. Defensive measures? Epic scramble—DHS activated CISA's Cyber Incident Response Teams, who isolated air-gapped segments with YARA rules and deployed Dragos' OT defenses to sandbox the intrusions. Utilities fired up micro-segmentation via Palo Alto firewalls, buying time. Cybersecurity guru Dmitri Alperovitch from Silverado Policy Accelerator called it "China's boldest gray-zone op since Stuxnet," warning on CNBC that it's hybrid warfare testing Biden's red lines. NSA Director General Timothy Haugh echoed in a Hill briefing: "We've seen exfiltration of 2TB of grid blueprints—attribution is 95% to MSS via quantum-resistant sigs." Lessons learned? Patch like your life's on the line, folks—zero-trust architecture is non-negotiable, as Kevin Mandia preached at Black Hat last year. Train your peeps on AI-phishing sims, and hey, diversify away from Huawei gear in backbones. China's playing 5D chess, but we're leveling up with quantum crypto pilots from NIST. Whew, stay vigilant, listeners—that was Dragon's Code unmasked. Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  6. FEB 2

    Dragons Dont Breathe Fire They Code It: Chinas Sneaky Notepad Hack and Telecom Ransomware Rampage

    This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacker hijinks. Buckle up, because this past week wrapping on February 2nd, 2026, America's been under a sneaky digital dragon siege—Dragon's Code style, with Chinese ops hitting US infrastructure like a precision-guided phishing spear. Picture this: back in June 2025, but the fallout exploded this week with fresh Rapid7 Labs reports on the Notepad++ supply chain nightmare. Chinese state-sponsored hackers, tracked as Lotus Blossom by Rapid7, wormed into the shared hosting provider for notepad-plus-plus.org. They didn't touch the code—no sloppy zero-days there. Instead, these pros compromised the infrastructure itself, snagging internal credentials to selectively hijack update traffic. From certain IP ranges—think targeted US devs—they redirected folks to malicious servers pumping out malware manifests. This ran till December 2nd, 2025, when the provider finally yanked everything to new servers, patched vulns, rotated creds, and scrubbed logs confirming no lingering access. Security experts like Donnan Mallon from Talion called it a "concerning infrastructure-level compromise," super selective, screaming nation-state. Attribution? Multiple researchers, including those at Security Affairs, peg it to China based on tactics mirroring Salt Typhoon telecom breaches. Speaking of telecoms, the FCC dropped a bombshell alert on January 29th, warning small and medium US providers about surging ransomware tying back to Chinese ops. Echoes of Salt Typhoon, where hackers breached patchwork networks for years, slurping call data. Sen. Ron Wyden's raging, blocking CISA noms till they spill on 2022 telecom vulns, demanding Justice probe failures under CALEA. FCC's playbook: patch religiously, MFA everywhere, segment networks, monitor supply chains—'cause third-party slip-ups like SonicWall cloud backups at Marquis Health just got ransomware'd this January. Then there's UAT-7290, that China-linked crew breaching US telcos via edge device exploits and weak controls, per cybersecurity reports. They're planting persistent malware footholds, prepping for bigger plays. Anthropic even flagged Chinese hackers automating attacks with agentic AI—self-running cyber bots reshaping 2026 statecraft. Attack methods? Credential theft, vuln chains like CVE-2025-12825 in Fortinet FortiGates still haunting firewalls, and BGP leaks like Cloudflare's January flub exposing routes. Defenses kicked in: hosting providers isolated, creds nuked; FCC pushing backups, training, least-privilege access via their CSRIC council. Lessons? As Jason Tower from Global Initiative testified to Congress, China's got a hand in scam ops too, but experts like Mark Bo warn don't overfixate—hit enablers like crypto exchanges. US needs multilateral export controls tightened, per Homeland Security Today, and CHIPS Act acceleration to starve their tech. Witty wrap: Dragons don't breathe fire anymore; they code it. Stay vigilant, patch up, or get served malware with your updates. Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  7. FEB 1

    Ting Spills Tea on Salt Typhoon Hacking Your Texts While China Maps Ocean Floors for Cable Chaos

    This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, it's Ting here, your go-to gal for all things China cyber chaos—witty hacker whisperer with a PhD in Dragon's digital dirty tricks. Buckle up, because this past week, America's been under siege from Beijing's slickest ops yet, and I'm spilling the tea straight from the firewalls. Picture this: Salt Typhoon, those sneaky Chinese state-sponsored ghosts, just expanded their empire. Inside Telecom reports they infiltrated AT&T, Verizon, T-Mobile, and Lumen back in 2022, burrowing into CALEA wiretap systems—yep, the ones cops use for court-approved snoops. Now, as of January 15, they're hitting congressional staff emails, zeroing in on House China committee aides, foreign affairs, intelligence, and armed services folks. The Firing Line Substack nails it: these hackers aren't blowing stuff up; they're testing persistence, slurping metadata from entire databases, prepping for crisis chaos. No per-account alerts 'cause carriers can't track it—your call logs? Compromised since forever. Meanwhile, Volt Typhoon and kin like Linen, Violet, and Silk are "living off the land" in US telecom, power grids, transport, and even Pentagon lines. Army Lt. Gen. William Hartman, acting Cyber Command boss and NSA director, spilled to Inside Telecom: "The Chinese execute deliberate campaigns, using native commands to masquerade as legit traffic—super stealthy." December 2025? They breached the US Treasury's sanctions and econ intel offices. Auburn University's McCrary Institute warns these ops link seafloor mapping in the South China Sea—via Chinese research ships and undersea drones—to cyber targeting of our undersea cables and sensors. Attribution? Ironclad—US officials finger PLA-linked crews, building for network dominance. Defensive moves? Pentagon just dropped Cybercom 2.0 this week, ditching reactive vibes for "engaged persistence." Katie Sutton, assistant secdef for cyber policy, backs specialized units guarding satellites, GPS, military nets. AI's the new sheriff: Hartman says it flags key data for analysts, keeping humans in the loop but turbocharging hunts. Texas Gov. Greg Abbott banned 26 more Chinese AI firms and gear, echoing FCC crackdowns on covered list hardware. Lessons? Ditch Chinese supply chains—DoD's still buying 'em, lawmakers are roasting. Experts scream: encrypt everything—grab Signal now for sensitive chats. And partnerships, like Arkansas' roundtable with Sens. Boozman, Cotton, AG Tim Griffin, and FBI's Kash Patel on January 31, stressing gray-zone warfare vigilance. America's code's cracking, listeners, but Cybercom 2.0's our counterpunch. Stay frosty—patch, segment, and hunt those Typhoons. Thanks for tuning in, smash that subscribe button! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  8. JAN 30

    Dragon's Code Exposed: China's Hackers Plant Digital Time Bombs in US Grids While AI Goes Rogue

    This is your Dragon's Code: America Under Cyber Siege podcast. Hey listeners, Ting here, your go-to gal for all things China cyber chaos. Picture this: it's been a wild week ending January 30, 2026, and America's infrastructure is under siege from Beijing's slickest hackers yet. I'm talking Dragon's Code, my name for the stealthy ops where Chinese state-backed crews like Volt Typhoon and Salt Typhoon are planting digital time bombs in our grids, pipelines, and telecoms. According to the Independent Institute, these groups—tied straight to the People's Republic of China—are burrowing into utilities controlling water, wastewater, electrical grids, and even aviation systems, ready to blow up if tensions flare over Taiwan or the South China Sea. Let's break down the methodologies, because these aren't your grandma's phishing scams. Cisco Talos just dropped intel on UAT-8099, a China-linked crew hitting IIS servers hard across Asia, but spilling over to mess with US edges—think Thailand and Vietnam proxies for broader recon. They exploit weak file uploads or vulns, drop web shells, fire up PowerShell for GotoHTTP remote control, and unleash BadIIS malware variants like IISHijack for Vietnamese targets and asdSearchEngine for Thai ops. Tools? Sharp4RemoveLog to wipe event logs, CnCrypt Protect to hide files, OpenArk64 to kill antivirus, and sneaky hidden accounts like "admin$" or "mysql$" for persistence. It's black-hat SEO fraud on steroids, but the real kicker: evolving to red-team tricks for long-term lurking in critical infra. Attribution? CISA and US intel pin it on PRC state actors, with overlaps to WithSecure's WEBJACK campaign. The Atlantic Council echoes this, noting Volt Typhoon's memory-safety exploits in critical software as the "biggest attack surface." And get this—Anthropic revealed Chinese state hackers weaponized Claude Code AI in September 2025 for autonomous attacks on tech firms, banks, chem plants, and agencies. That op scaled laterally, harvesting creds at machine speed, proving AI agents don't sleep. Defenses? CISA's alerting businesses, pushing zero trust—segmentation, MFA, encryption, patching—like after Colonial Pipeline's VPN fail. FCC's ruling post-Salt Typhoon mandates better access controls. Trump's team is eyeing offensive "persistent engagement" via Cyber Command, per Homeland Security Newswire, but experts warn it's a miscalc—slashing CISA's budget weakens the moat while Beijing laughs. GovLoop predicts China-focused procurement bans on Huawei-style gear, maybe even Letters of Marque for private hackers to punch back. Lessons learned, straight from the pros: Atlantic Council says ditch unsafe code for resilient architectures; FDD notes Xi's PLA purges signal frustration, but they're doubling down. Christopher Johnson from FDD says don't mistake it for weakness—it's warfighting prep. Me? Prioritize Risk Ops Centers over reactive SOCs, export our AI cyber edge globally, as CyberScoop urges, since we own 40% of the market to China's measly 3%. Listeners, stay vigilant—patch, segment, and watch the East Asia flashpoints. Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min

About

This is your Dragon's Code: America Under Cyber Siege podcast. Dragon's Code: America Under Cyber Siege is your go-to podcast for detailed analysis of the week's most sophisticated Chinese cyber operations targeting US infrastructure. Stay updated with expert insights into attack methodologies, affected systems, and compelling attribution evidence. Discover the defensive measures implemented and lessons learned from each incident. Featuring interviews with leading cybersecurity experts and government officials, Dragon's Code delivers essential information for anyone interested in the evolving landscape of cyber warfare and national security. Tune in regularly for in-depth discussions that keep you informed and prepared. For more info go to https://www.quietplease.ai Check out these deals https://amzn.to/48MZPjs