Cyber Crime Junkies - podcast cover

Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.cybercrimejunkies.com

Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.

Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

Episodes

Hiring Fraud Exposed! Latest AI Threats to Business.

🔥🚨NEW EPISODE 🔥🚨 We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now generated by AI, raising authenticity issues. North Korean agents have infiltrated numerous US companies. Cybersecurity alerts from the FBI s...

Mar 10, 202529 minSeason 6Ep. 56

Zero Trust. Social Engineering. Ron Woerner.

Zero Trust. New Approaches to Social Engineering. Video Episode : https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec ( https://veteransec.org/), a non-profit that helps military build their cybersecurity careers. We cover...

Mar 09, 202544 minSeason 2Ep. 46

Innovative Ways to Reduce Website Spoofing

After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco , https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topics: new ways to reduce cyber risks in financial institutions, ways to prevent account take overs, innovative ways to reduce website spoofing, latest types of phishing, dangers...

Mar 08, 202559 minSeason 4Ep. 56

Unmasking Invisible Threats: Quantifying Cyber Security

Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of Fractional CISO, about his journey in the cybersecurity industry and the challenges faced by medium-sized businesses. They discuss the importance of translating cybersecurity into business terms, the need for internal communication and making the case to leadership, a...

Mar 07, 20251 hr 4 minSeason 6Ep. 25

Is Ransomware Dead? What Cyber Criminals Are Saying.

Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1 , joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tactics insight from the mouths of top cyber crime gang leaders. We bring you Inside the Corporate-Style Operations of Cyber Criminals. · Don't miss the Video episodes! · Our YouTube Channel @Cybercrimejunkiespodcast · Contact us direct! ...

Mar 06, 202534 minSeason 4Ep. 2

Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail"

When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail". · ways to grow brands by adapting to emerging tech, · how to use imagination in brand gro...

Mar 02, 202557 minSeason 6Ep. 15

Phone Rings. It's A Social Engineer Callling.

Video Episode: https://youtu.be/oH7FpvHOhVA This is the story of Matt Smallman, author of “ Unlocking Your Call Centre” , about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics. We explore how to balance convenience with security, how to protect call centers from social engineering and ways to reduce cyber security risks in call centers without compro...

Mar 01, 202558 minSeason 4Ep. 59

Quantum AI: What You Need to Know NOW!

Quantum AI: What You Need to Know NOW! 🚨🔐 Quantum computing is revolutionizing cybersecurity—are we ready? In this Cyber Crime Junkies episode, we uncover how quantum tech could break encryption, threaten sensitive data, and reshape industries. But is it all bad? Discover the risks, the opportunities, and what businesses must do now to stay ahead. ⚡ Quantum Threats & Solutions 🔑 Why Encryption May Soon Be Obsolete 🚀 How to Prepare for the Quantum Era Don't get left behind—watch now!...

Feb 28, 202532 minSeason 6Ep. 55

War Games. In Business.

This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like table top exercises, importance of operational resilience in business, what is operational resilience. Lester’s LinkedIn profile- https://www.linkedin.co...

Feb 28, 202546 minSeason 6Ep. 20

New Ways Leaders Can Assess Their Risk Appetite

In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite. KEY TOPICS: · how risk appetite effects your cyber security plans, · explaining risk appetite in cyber security to leadership, · how security planning involves risk appetite, · new ways leaders can assess their risk appetite, · how cyber insurance works, · how cyber insurance is only one part of risk management, · and risk management beyond cyber insurance...

Feb 26, 202553 minSeason 6Ep. 30

🔥 Truth About FYRE Festival🔥 How Online Fraud Works

We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaways A single Instagram post from Kendall Jenner cost $250,000 The Fyre Festival was a masterclass in social media deception They spent millions on influ...

Feb 23, 202533 minSeason 6Ep. 54

Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security

Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group ( https://www.vaillancegroup.com ) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zone tours in Iraq and Afghanistan as a Case Officer and Detachment Chief and served as a Supervisory Branch Chief in Europe. Chapters 00:00 Introduct...

Feb 21, 202556 minSeason 6Ep. 16

Secrets Revealed--How To Grow Business Not Get Hacked🔥

🚨 New episode 🚨 host David Mauro engages with technology and security leaders to explore the critical roles of Network Operations Centers (NOC) and Security Operations Centers (SOC) in modern businesses. The discussion highlights how to grow business not get hacked, Navigating the NOC and SOC Landscape, New Ways To Use Tech For Business And Not Get Breached, And How To Avoid Business Data Breaches. What Leaders Should Know. Chapters · 00:00 How To Grow Business Not Get Hacked · 05:11 Networks ...

Feb 19, 202539 minSeason 6Ep. 53

Most Wanted Dark Web Hackers. Truth about Scattered Spider.

🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover, Exposed Secrets Of Cyber Crime Gangs, Profiling The People Who Cause Ransomware Attacks, how do hackers not get caught, hackers, undercover hackers, and When Hackers Get Caught. Chapters · 00:00 Profiling The People Who Cause Ransomware Attacks · 03:00...

Feb 15, 202548 minSeason 6Ep. 52

Famous Hacker Reveals! True Ethical Hacking Stories.

🚨New Episode 🚨We’re joined in-studio by Bryan Seely — World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ . He’s also the author of Cyber Fraud: The Web of Lies ! We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping, Google Maps, data brokers and privacy concerns, how data brokers operate without regulation, and How Hackers Breach Big Tech. Send us a text Gr...

Feb 14, 202550 minSeason 6Ep. 51

When Gamers Start Swatting: Violence for Hire Online

We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com     Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow...

Feb 12, 202553 minSeason 6Ep. 28

Future of AI in Cybersecurity. A Double-Edge Sword.

🚀 AI is transforming cybersecurity! In this episode of Cyber Crime Junkies , host David Mauro interviews Arik Solomon , CEO of Cypago and former CTO of EY’s Cybersecurity Center , to explore the future of Governance, Risk, and Compliance (GRC) in cybersecurity. 🔍 What You’ll Learn: ✅ The role of AI in cybersecurity automation ✅ Why GRC is essential for businesses of all sizes ✅ How AI and NLP reduce manual efforts in risk management ✅ Cyber threats & compliance challenges for CISOs and SMB...

Feb 09, 202530 minSeason 6Ep. 50

How Everyone Is Responsible For Cyber Security. Phantom CISO.

Mishaal Khan, Best-selling Author of The Phantom CISO , Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how everyone is responsible for cyber security. https://www.phantomciso.com/ https://www.operationprivacy.com/ Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www...

Feb 09, 20251 hrSeason 6Ep. 17

Safeguarding Your Privacy: How to Delete Your Data

David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ , about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential risks of AI and deepfake technology. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-627...

Feb 07, 202559 minSeason 6Ep. 27

Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.

Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec , an crowd-sourced WAZE-Like Security platform. Learn more here: https://crowdsec.net Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com     Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct....

Feb 02, 202548 minSeason 6Ep. 19

The Dark Side - New Ways AI is used in Social Engineering.

Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com     🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and neve...

Jan 31, 202535 minSeason 6Ep. 7

No Exit-When Data Back Ups Fail

Gabe Gambill, international technology expert with Quorum ( https://get.quorum.com/ ) who leads executives to understand what happens when data back ups fail and how to plan accordingly. Summary In this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and cybersecurity. They discuss the challenges of patching vulnerabilities, the importance of data backup and recovery, and the role of the CISO in sec...

Jan 29, 202557 minSeason 6Ep. 18

Ransomware Gang TAKE DOWN: Secrets from the Dark Web.

Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: ransomware explained for small business and ransomware risks for small business, how cyber attacks stay undetected, how intelligence gathering is critical to security, secrets of cyber crime gangs, how stolen data is sold by cyber criminals, and understanding the hacker mind. Don’t miss Jon’s book, The Art of Cyber Warfare: https:/...

Jan 28, 202552 minSeason 6Ep. 32

Caught: The Williams Woods Identity Theft Story - A Shocking Twist.

The Williams Woods Story. What Happens when Your Identity is Stolen. Video Episode : https://youtu.be/mBU3J-4vKww Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com     Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never ...

Jan 26, 202543 minSeason 6Ep. 19

Biggest Data Breach in Modern History. What To Do Now.

The world of cybersecurity has been rocked by a data breach so colossal that it's being called the Biggest Data Breach in Modern History. The National Public Data breach and hacker USDoD are discussed in a true cyber crime story. The biggest data breach in modern history, involving National Public Data and its sister site Records Check. The breach compromised sensitive personal data of over 2 billion people and exposed vulnerabilities in cybersecurity practices. The hacker behind the breach...

Jan 24, 202549 minSeason 6Ep. 6

Why Cyber Attacks are Not All Equal

Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other breaches see data auctioned off to the highest bidder? Let's delve into these mysteries, each a tale of intrigue and unseen adversaries. Sen...

Jan 23, 202533 minSeason 6Ep. 26

Inside The Truth About Why TikTok Got Banned in US.

The US has signed into new law the Ban of Tik Tok which took effect today and now is on hold pending a sale in the next 90-days. What does this mean? Covering: latest news on tik tok ban, latest on tik tok ban, latest tik tok ban, latest tik tok ban news in us, TikTok ban in US latest news, TikTok ban in USA latest news, TikTok banned in us, TikTok banned in us why, TikTok banned in USA, TikTok banned in USA 2025, why is TikTok banned in the US, why is TikTok banned in the USA, why is TikTok get...

Jan 19, 202510 minSeason 6Ep. 30

Cybercrime vs Small Business. Insider View of Cyber Crime.

Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber Crime 14:52 Entry-Level Opportunities in Cybersecurity 19:55 The Broad Scope of Cybersecurity Roles 26:15 Small Business Cyber Risk 34:59 The Need...

Jan 19, 202549 minSeason 6Ep. 29

When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses

Cyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, cyber crime news we all need to know, cyber crime real life cases, cyber security news this week, cyber crime podcast, latest cyber crime news we all n...

Jan 17, 202528 minSeason 6Ep. 13

Got AI? Fake Videos. Social Engineering.

🚨 NEW EPISODE ALERT! 🚨 🔒 Are you prepared for the risks of AI-powered deception? Got AI? What to watch for in Fake Videos and Social Engineering. 🤖 Are you ready to confront the dark side of AI? 🤖 Unmasking AI Deepfakes & Cyber Threats. Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybe...

Jan 15, 202517 minSeason 6Ep. 21