
Cyber Crime Junkies
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
Episodes
247 episodes
🔥 Truth About FYRE Festival🔥 How Online Fraud Works
We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the dis...
•
Season 6
•
Episode 54
•
32:32

Unlocking Unity: The Power of Civil Discourse and Protecting Online Privacy in America
Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over...
•
Season 6
•
Episode 9
•
1:00:28
%20(1).png)
RANSOMWARE 🎯 What You Need to Know 🎯
Host David Mauro interviews Jon DiMaggio, a well-respected cybercrime investigator, delving into the operations of LockBit, once the Top ransomware gang and now a Cyber Crime Gang Exposed. We discuss the Ransomware Take Down of #Lockbit, and ho...
•
Season 6
•
Episode 82
•
45:48

Cyber Risk Unleashed. Latest Threats To Business.
Elizabeth Houser, Director of Cyber defense at Defense Storm, discusses her role in cybersecurity and her creation of the Security Intel Bulletin. We discuss what cyber risk means for business leaders today. She emphasizes the importance of tra...
•
Season 6
•
Episode 66
•
53:05
.png)
Cybercrime vs Small Business. Insider View of Cyber Crime.
Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show.<...
•
Season 6
•
Episode 29
•
49:17

Cyber Traps at Home! How to Keep Your Family Safe Online.🔥
Host David Mauro interviews Dr. Feleks Kravetz, US citizen who migrated from the former USSR and founder of Cuber Security Easy.We discuss:🎯protecting yourself online, 🎯cybersecurity risks for families, and ...
•
Season 6
•
Episode 81
•
54:23

Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
Catch the Video episode: https://youtu.be/zMNsjSGT-ywAaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos in...
•
Season 6
•
Episode 69
•
51:25

How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business
Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from somethin...
•
Season 6
•
Episode 80
•
58:38

Are you at Risk? Personal Liability Cyber Breaches.
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI o...
•
Season 6
•
Episode 64
•
54:33
%20(1).png)
🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram?
📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3?⚠️ It’s a scam. Full stop.The FBI just issued an alert warning the public: They are NOT direct ...
•
Season 6
•
1:47

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tort...
•
Season 6
•
Episode 68
•
1:36:41
.png)
New Alert 🚨 Beware of Your Next Google Search🚨
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake?🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercrim...
•
Season 6
•
1:55

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real?🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing
•
Season 6
•
1:39

Zero Trust, SMB & National Security. INTEL CTO Exclusive.
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9oSteve Orrin, Federal CT...
•
Season 6
•
Episode 62
•
1:01:40

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with ...
•
Season 6
•
Episode 75
•
58:15

How start a career in cybersecurity today. Josh Mason
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military i...
•
Season 6
•
Episode 63
•
56:21

Zero Trust. Social Engineering. Ron Woerner.
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to un...
•
Season 6
•
Episode 67
•
44:18

Oracle Breach 2025 🎯 How Hackers Attack
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the ...
•
Season 6
•
Episode 74
•
35:53

Hunting Down Hackers. John Hammond Exclusive.
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQExamples with advice from top security content creato...
•
Season 6
•
Episode 4
•
1:00:59

🔥 How Hackers Can Protect Your Business | AI Risks & DEF CON Secrets🔥
What if the hackers are actually the heroes?In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Securit...
•
Season 6
•
Episode 73
•
58:42

Mind Games: Exploring Brain Reactions in Social Engineering
We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing.
•
Season 6
•
Episode 10
•
52:29

CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson.
🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime.Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. ...
•
Season 6
•
Episode 25
•
51:15

Hacking Humans Using Science
Chris Hadnagy, Best-selling author, security expert and CEO of Social Engineer, LLC, join sus to discuss hacking humans using sacience.Topics: understanding science in social engineering, hacking humans using science, neuroscienc...
•
Season 3
•
Episode 9
•
57:08
