🔥🚨NEW EPISODE 🔥🚨 We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now generated by AI, raising authenticity issues. North Korean agents have infiltrated numerous US companies. Cybersecurity alerts from the FBI s...
Mar 10, 2025•29 min•Season 6Ep. 56
Zero Trust. New Approaches to Social Engineering. Video Episode : https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec ( https://veteransec.org/), a non-profit that helps military build their cybersecurity careers. We cover...
Mar 09, 2025•44 min•Season 2Ep. 46
After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco , https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topics: new ways to reduce cyber risks in financial institutions, ways to prevent account take overs, innovative ways to reduce website spoofing, latest types of phishing, dangers...
Mar 08, 2025•59 min•Season 4Ep. 56
Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of Fractional CISO, about his journey in the cybersecurity industry and the challenges faced by medium-sized businesses. They discuss the importance of translating cybersecurity into business terms, the need for internal communication and making the case to leadership, a...
Mar 07, 2025•1 hr 4 min•Season 6Ep. 25
Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1 , joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tactics insight from the mouths of top cyber crime gang leaders. We bring you Inside the Corporate-Style Operations of Cyber Criminals. · Don't miss the Video episodes! · Our YouTube Channel @Cybercrimejunkiespodcast · Contact us direct! ...
Mar 06, 2025•34 min•Season 4Ep. 2
When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail". · ways to grow brands by adapting to emerging tech, · how to use imagination in brand gro...
Mar 02, 2025•57 min•Season 6Ep. 15
Video Episode: https://youtu.be/oH7FpvHOhVA This is the story of Matt Smallman, author of “ Unlocking Your Call Centre” , about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics. We explore how to balance convenience with security, how to protect call centers from social engineering and ways to reduce cyber security risks in call centers without compro...
Mar 01, 2025•58 min•Season 4Ep. 59
Quantum AI: What You Need to Know NOW! 🚨🔐 Quantum computing is revolutionizing cybersecurity—are we ready? In this Cyber Crime Junkies episode, we uncover how quantum tech could break encryption, threaten sensitive data, and reshape industries. But is it all bad? Discover the risks, the opportunities, and what businesses must do now to stay ahead. ⚡ Quantum Threats & Solutions 🔑 Why Encryption May Soon Be Obsolete 🚀 How to Prepare for the Quantum Era Don't get left behind—watch now!...
Feb 28, 2025•32 min•Season 6Ep. 55
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like table top exercises, importance of operational resilience in business, what is operational resilience. Lester’s LinkedIn profile- https://www.linkedin.co...
Feb 28, 2025•46 min•Season 6Ep. 20
In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite. KEY TOPICS: · how risk appetite effects your cyber security plans, · explaining risk appetite in cyber security to leadership, · how security planning involves risk appetite, · new ways leaders can assess their risk appetite, · how cyber insurance works, · how cyber insurance is only one part of risk management, · and risk management beyond cyber insurance...
Feb 26, 2025•53 min•Season 6Ep. 30
We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaways A single Instagram post from Kendall Jenner cost $250,000 The Fyre Festival was a masterclass in social media deception They spent millions on influ...
Feb 23, 2025•33 min•Season 6Ep. 54
Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group ( https://www.vaillancegroup.com ) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zone tours in Iraq and Afghanistan as a Case Officer and Detachment Chief and served as a Supervisory Branch Chief in Europe. Chapters 00:00 Introduct...
Feb 21, 2025•56 min•Season 6Ep. 16
🚨 New episode 🚨 host David Mauro engages with technology and security leaders to explore the critical roles of Network Operations Centers (NOC) and Security Operations Centers (SOC) in modern businesses. The discussion highlights how to grow business not get hacked, Navigating the NOC and SOC Landscape, New Ways To Use Tech For Business And Not Get Breached, And How To Avoid Business Data Breaches. What Leaders Should Know. Chapters · 00:00 How To Grow Business Not Get Hacked · 05:11 Networks ...
Feb 19, 2025•39 min•Season 6Ep. 53
🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover, Exposed Secrets Of Cyber Crime Gangs, Profiling The People Who Cause Ransomware Attacks, how do hackers not get caught, hackers, undercover hackers, and When Hackers Get Caught. Chapters · 00:00 Profiling The People Who Cause Ransomware Attacks · 03:00...
Feb 15, 2025•48 min•Season 6Ep. 52
🚨New Episode 🚨We’re joined in-studio by Bryan Seely — World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ . He’s also the author of Cyber Fraud: The Web of Lies ! We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping, Google Maps, data brokers and privacy concerns, how data brokers operate without regulation, and How Hackers Breach Big Tech. Send us a text Gr...
Feb 14, 2025•50 min•Season 6Ep. 51
We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow...
Feb 12, 2025•53 min•Season 6Ep. 28
🚀 AI is transforming cybersecurity! In this episode of Cyber Crime Junkies , host David Mauro interviews Arik Solomon , CEO of Cypago and former CTO of EY’s Cybersecurity Center , to explore the future of Governance, Risk, and Compliance (GRC) in cybersecurity. 🔍 What You’ll Learn: ✅ The role of AI in cybersecurity automation ✅ Why GRC is essential for businesses of all sizes ✅ How AI and NLP reduce manual efforts in risk management ✅ Cyber threats & compliance challenges for CISOs and SMB...
Feb 09, 2025•30 min•Season 6Ep. 50
Mishaal Khan, Best-selling Author of The Phantom CISO , Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how everyone is responsible for cyber security. https://www.phantomciso.com/ https://www.operationprivacy.com/ Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www...
Feb 09, 2025•1 hr•Season 6Ep. 17
David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ , about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential risks of AI and deepfake technology. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-627...
Feb 07, 2025•59 min•Season 6Ep. 27
Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec , an crowd-sourced WAZE-Like Security platform. Learn more here: https://crowdsec.net Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct....
Feb 02, 2025•48 min•Season 6Ep. 19
Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and neve...
Jan 31, 2025•35 min•Season 6Ep. 7
Gabe Gambill, international technology expert with Quorum ( https://get.quorum.com/ ) who leads executives to understand what happens when data back ups fail and how to plan accordingly. Summary In this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and cybersecurity. They discuss the challenges of patching vulnerabilities, the importance of data backup and recovery, and the role of the CISO in sec...
Jan 29, 2025•57 min•Season 6Ep. 18
Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: ransomware explained for small business and ransomware risks for small business, how cyber attacks stay undetected, how intelligence gathering is critical to security, secrets of cyber crime gangs, how stolen data is sold by cyber criminals, and understanding the hacker mind. Don’t miss Jon’s book, The Art of Cyber Warfare: https:/...
Jan 28, 2025•52 min•Season 6Ep. 32
The Williams Woods Story. What Happens when Your Identity is Stolen. Video Episode : https://youtu.be/mBU3J-4vKww Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never ...
Jan 26, 2025•43 min•Season 6Ep. 19
The world of cybersecurity has been rocked by a data breach so colossal that it's being called the Biggest Data Breach in Modern History. The National Public Data breach and hacker USDoD are discussed in a true cyber crime story. The biggest data breach in modern history, involving National Public Data and its sister site Records Check. The breach compromised sensitive personal data of over 2 billion people and exposed vulnerabilities in cybersecurity practices. The hacker behind the breach...
Jan 24, 2025•49 min•Season 6Ep. 6
Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other breaches see data auctioned off to the highest bidder? Let's delve into these mysteries, each a tale of intrigue and unseen adversaries. Sen...
Jan 23, 2025•33 min•Season 6Ep. 26
The US has signed into new law the Ban of Tik Tok which took effect today and now is on hold pending a sale in the next 90-days. What does this mean? Covering: latest news on tik tok ban, latest on tik tok ban, latest tik tok ban, latest tik tok ban news in us, TikTok ban in US latest news, TikTok ban in USA latest news, TikTok banned in us, TikTok banned in us why, TikTok banned in USA, TikTok banned in USA 2025, why is TikTok banned in the US, why is TikTok banned in the USA, why is TikTok get...
Jan 19, 2025•10 min•Season 6Ep. 30
Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber Crime 14:52 Entry-Level Opportunities in Cybersecurity 19:55 The Broad Scope of Cybersecurity Roles 26:15 Small Business Cyber Risk 34:59 The Need...
Jan 19, 2025•49 min•Season 6Ep. 29
Cyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, cyber crime news we all need to know, cyber crime real life cases, cyber security news this week, cyber crime podcast, latest cyber crime news we all n...
Jan 17, 2025•28 min•Season 6Ep. 13
🚨 NEW EPISODE ALERT! 🚨 🔒 Are you prepared for the risks of AI-powered deception? Got AI? What to watch for in Fake Videos and Social Engineering. 🤖 Are you ready to confront the dark side of AI? 🤖 Unmasking AI Deepfakes & Cyber Threats. Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybe...
Jan 15, 2025•17 min•Season 6Ep. 21