
Cyber Crime Junkies
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
Episodes
234 episodes
Innovative Ways to Reduce Website Spoofing
After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at
•
Season 4
•
Episode 56
•
59:25
.png)
Unmasking Invisible Threats: Quantifying Cyber Security
Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of...
•
Season 6
•
Episode 25
•
1:04:12
.png)
Is Ransomware Dead? What Cyber Criminals Are Saying.
Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber ...
•
Season 4
•
Episode 2
•
34:03

Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail"
When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended ...
•
Season 6
•
Episode 15
•
57:25
.png)
Phone Rings. It's A Social Engineer Callling.
Video Episode: https://youtu.be/oH7FpvHOhVA This is the story of Matt Smallman, author of “
•
Season 4
•
Episode 59
•
58:17
.jpeg)
Quantum AI: What You Need to Know NOW!
Quantum AI: What You Need to Know NOW! 🚨🔐 Quantum computing is revolutionizing cybersecurity—are we ready? In this Cyber Crime Junkies episode, we uncover how quantum tech could break encryption, threaten sensitive data, and reshape industries....
•
Season 6
•
Episode 55
•
31:35

War Games. In Business.
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business.Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war ga...
•
Season 6
•
Episode 20
•
46:02

New Ways Leaders Can Assess Their Risk Appetite
In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.KEY TOPICS: · how risk appetite effects your cyber s...
•
Season 6
•
Episode 30
•
53:22
.jpg)
🔥 Truth About FYRE Festival🔥 How Online Fraud Works
We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the dis...
•
Season 6
•
Episode 54
•
32:33

Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence A...
•
Season 6
•
Episode 16
•
55:48
.png)
Secrets Revealed--How To Grow Business Not Get Hacked🔥
🚨 New episode 🚨 host David Mauro engages with technology and security leaders to explore the critical roles of Network Operations Centers (NOC) and Security Operations Centers (SOC) in modern businesses. The discussion highlights ho...
•
Season 6
•
Episode 53
•
38:47

Most Wanted Dark Web Hackers. Truth about Scattered Spider.
🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover...
•
Season 6
•
Episode 52
•
47:36

Famous Hacker Reveals! True Ethical Hacking Stories.
🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s a...
•
Season 6
•
Episode 51
•
49:44

When Gamers Start Swatting: Violence for Hire Online
We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online.
•
Season 6
•
Episode 28
•
53:01

Future of AI in Cybersecurity. A Double-Edge Sword.
🚀 AI is transforming cybersecurity! In this episode of Cyber Crime Junkies, host David Mauro interviews Arik Solomon, CEO of Cypago and former CTO of EY’s Cybersecurity Center, to explore the future of ...
•
Season 6
•
Episode 50
•
29:32

How Everyone Is Responsible For Cyber Security. Phantom CISO.
Mishaal Khan, Best-selling Author of The Phantom CISO, Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how every...
•
Season 6
•
Episode 17
•
1:00:12
.png)
Safeguarding Your Privacy: How to Delete Your Data
David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and p...
•
Season 6
•
Episode 27
•
59:23
%20(1).png)
Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.
Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of
•
Season 6
•
Episode 19
•
48:10
.png)
The Dark Side - New Ways AI is used in Social Engineering.
Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes.
•
Season 6
•
Episode 7
•
34:36
.png)
No Exit-When Data Back Ups Fail
Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understan...
•
Season 6
•
Episode 18
•
56:35
.png)
Ransomware Gang TAKE DOWN: Secrets from the Dark Web.
Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: ransomware explained for small business and ransomware risks...
•
Season 6
•
Episode 32
•
51:55

Caught: The Williams Woods Identity Theft Story - A Shocking Twist.
The Williams Woods Story. What Happens when Your Identity is Stolen.Video Episode: https://youtu.be/mBU3J-4vKww
•
Season 6
•
Episode 19
•
42:30
.png)
Biggest Data Breach in Modern History. What To Do Now.
The world of cybersecurity has been rocked by a data breach so colossal that it's being called the Biggest Data Breach in Modern History. The National Public Data breach and hacker USDoD are discussed in a true cyber crime story....
•
Season 6
•
Episode 6
•
49:01
.png)
Why Cyber Attacks are Not All Equal
Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why...
•
Season 6
•
Episode 26
•
33:01
.png)
Inside The Truth About Why TikTok Got Banned in US.
The US has signed into new law the Ban of Tik Tok which took effect today and now is on hold pending a sale in the next 90-days. What does this mean?Covering: latest news on tik tok ban, latest on tik tok ban, latest tik tok ban, latest...
•
Season 6
•
Episode 30
•
9:49
