Cyber Crime Junkies
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast
Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
Cyber Crime Junkies
Ransomware Attack | Who Are You Going to Call?
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
🔥New Episode🔥 The Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime to ensure your online safety.
CHAPTERS
00:00 Introduction: Why Your First Call During a Cyber Attack Matters
00:10 Welcome and Overview: Hospital Ransomware Scenario at 2AM
01:14 Meet Nick Morrison: Kentucky Office of Homeland Security
02:04 What is a Fusion Center and Why Nobody Knows About It
03:07 Building Relationships Before Crisis: The Public-Private Partnership
04:19 Statistics That Prove Law Enforcement Involvement Saves Money
06:12 How FBI Can Help Avoid Paying Ransoms
08:06 Incident Response Planning: Why Fire Drills Apply to Cyber Attacks
10:10 Real Hospital Breach Scenario: Small IT Team Gets Hit
12:45 First Critical Steps: Detection and Containment When Ransomware Strikes
15:19 What MSPs Do Well vs What's Missing in Cybersecurity
17:16 Why Every Minute Counts During Initial Response
18:21 Network Operations vs Security Operations: Understanding the Difference
18:53 Governance Explained: Proactive vs Reactive Security Mindset
21:40 Why Breached Organizations Are Most Proactive About Security
23:47 Incident Response Plans: Roles, Responsibilities, and Asset Protection
25:55 Car Door Analogy: How Hackers Are Opportunistic, Not Creative
27:10 AI Arms Race: Defenders and Attackers Using Same Technology
28:10 Prompt Injection Attacks Explained: The New AI Vulnerability
30:17 MoltBook Breach: When AI Social Networks Get Compromised in Days
32:55 Who Should Be in the Room for Incident Response Planning
34:30 Risk Appetite: Understanding Acceptable Risk in Cybersecurity
36:14 Living Documen
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
🔥New Exclusive Offers for our Listeners! 🔥
- 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies
- 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME
- 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq
Dive Deeper:
🔗 Website: https://cybercrimejunkies.com
📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief
✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
===========================================================
Podcasts we love
Check out these other fine podcasts recommended by us, not an algorithm.
Breaching the Boardroom
NetGain Technologies, LLC
Detrás de la pantalla
Dr. Sergio E. Sanchez, el Dr. Qubit.