Discover
Cyber Crime Junkies
Cyber Crime Junkies
Author: Cyber Crime Junkies. Host David Mauro.
Subscribed: 223Played: 3,016Subscribe
Share
© 2026 Dean Mauro and Cyber Crime Junkies
Description
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast
Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
324 Episodes
Reverse
What if AI didn't try to destroy humanity? What if it just gave us 7 days to decide if we even deserve to lead? That's the premise of "The God's Prompt" — a new techno-thriller from Dr. Sergio Sanchez. Former Apple. Former Vatican. Former Activision. And a surgeon. CHAPTERS 00:00 Meet Dr. Sergio Sanchez: Apple, Vatican, Activision, and Surgeon02:05 AI Deepfakes and the Death of Trusted News04:15 The God's Prompt: Inside the AI Techno Thriller06:10 How Dr. Sanchez Wrote a Book While AI Kept ...
New non-fiction Book Series is out! Moving Target: The Art of Online Camouflage drops April 14.Moving Target: The Obedient Machine drops April 21.Book 3 -- Ghost and the Machine -- out soon!4 years. 400+ interviews. Available on Amazon. We are all Stevie Parker. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. New non-fiction Book Series is out! Moving Target: The Art of Online Camouflage drops April 14.Mov...
Have you ever noticed how we keep telling ourselves cyber risk is a “future problem” right up until it walks in the front door wearing a name badge? Because in this episode, we’re not talking about Hollywood hackers or hoodie clichés. We’re talking about how attacks actually happen now. We interview global vCISO Dan Elliott from Recorded Future all about it. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Ne...
I spent years interviewing FBI agents, ransomware negotiators, former hackers, and intelligence officers on my podcast. And I wrote a book that translates everything they told me into plain English — through a story that is going to make you recognize yourself on every page. It is called Moving Target: A trilogy and the first 2 books are available now on amazon. Link below Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Ne...
New Episode🔥New Episode🔥This episode dives deep into the recent availability of Dark Sword, a potent zero click attack tool previously used by Russian intelligence, now accessible to criminals. We discuss the severe implications for cybersecurity as this zero day exploit, requiring no download, offers unfettered access to mobile devices. Join us to understand the risks of phone hacking and how it impacts your digital safety. Chapters 00:00 Russian Intelligence Exploit Goes Public on GitHub 0...
New Episode🔥New Episode🔥This thought-provoking video explores the intricacies of human biology, detailing the trillions of unconscious decisions our bodies make daily, from immune responses to cell division. It raises questions about the nature of consciousness and free will within these automatic processes. The discussion also touches on neuroscience and decision making, offering a unique perspective on human autonomy. In this engaging interview, host David Dean Mauro speaks with Mike Acerr...
Ever notice that the company whose entire business model depends on you never putting your phone down is now in court defending itself for... making you never put your phone down? Meta is on trial in Los Angeles. Not for a data breach. Not for a hack. For allegedly engineering their platforms to be as addictive as possible, specifically targeting kids. And here's what nobody's talking about: this isn't a bug. The engagement algorithms, the infinite scroll, the dopamine loops, the notification...
Today we’re talking about AI-powered cybercrime—a phrase that sounds like a marketing stunt but is, unfortunately, very real. Cybercriminals basically got a software update, and now they’re running their operations with more automation, more scale, and — let’s just say it — better customer service than half the vendors in your tech stack. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. New non-fiction Book Series is out!&n...
New Episode🔥The Cybercrime Junkies Chaos Panel with inventor Mike Acerra founder of LuxBlox and Dr Sergio Sanchez. The show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime. CHAPTERS 00:00 AI and Identity Theft 08:10 AI clones your voice and steals your jo...
Exciting announcement for our podcast listeners. Our non-fiction True crime Book MOVING TARGET: ART OF ONLINE CAMOFLAUGE was just published. Moving Target: The Art of Online Camouflage is available now on Amazon — paperback, hardcover, and Kindle ebook. Book 1 of the Moving Target Trilogy. https://a.co/d/01fq72zj Three years. 400+ interviews. One book that turned that has turned into three-A new trilogy. Stevie Parker is a successful leader, mother and daughter. Does everything right until cy...
23andMe | Your DNA Was SOLD | What To Do NOW. How people can delete their 23andMe data 23andMe has an automated account deletion process inside account settings. Practical steps, in human terms: Log in, go to Account Settings. Find the 23andMe Data section. Download your data first if you want a copy. Choose the option to permanently delete data, then confirm via the email they send.If you previously opted into research or sharing, also revoke tho...
New Episode🔥🔥The Cybercrime Junkies show discusses contemporary `cyber security` challenges, emphasizing that older notions of threats are outdated. We dive into how direct `hacking` via `wifi` can lead to gaining `root` access, and how quick action is needed to mitigate these `exploit`s. Stay informed to protect your systems from `cyber crime` and ensure proper `shell` access management. ========================================================== 00:00 Cold Open – Welcome to Chaos 01:...
What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Understand, Manage, and Measure Cyber Risk®,Practical Solutions for Creating a Ryan has decades of experience as a Cyber Expert for McKinsey &...
New Episode🔥The Cybercrime Junkies interviews cybersecurity expert Chris Griffin offering insights for cybersecurity for beginners and seasoned pros alike. This episode explores the critical role of PCI in network security and emphasizes the importance of compliance to protect against threats. Stay informed and protect yourself from cyber crime. CHAPTERS 00:00 Meet Chris Griffin: From Help Desk to Penetration Testing Pioneer 08:10 Zero Trust Architecture: The Blind Trust Problem Nobody...
New Episode🔥New Episode🔥The Cybercrime Junkies show dives into this critical discussion on data protection, highlighting how a "bad actor" can compromise your personal information. We explore real cyber crime stories, emphasizing the need for robust internet security and online safety measures for everyone. Stay informed and protect yourself from cyber crime. Robert Sicliano, international Speaker on Cybersecurity and Fraud prevention, best-selling author of 5 books on the subject ad regular...
🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling true crime story. Eric O'Neill, a former FBI operative, discusses his experiences in espionage, particularly focusing on the case of Robert Hansen, one of the most damaging spies ...
A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy. The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution of multiple double agents and triggering the worst intelligence breach in U.S. history. 🕵️♂️🔥 In this episode, we break down how a 26-year-old undercover FBI operative, Eric O’Ne...
LOCKBIT Cyber Crime Takedown EXPOSED NOW! Jon DiMaggio, Senior Security Strategist and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Background08:10 Financial Aspects of Ransomware Operations24:33 Technical Skills and Criminal Intent39:46 The Self-Convening Justice System in the Criminal Underground48:31 The Importance of Effective Communicati...
🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover, Exposed Secrets Of Cyber Crime Gangs, Profiling The People Who Cause Ransomware Attacks, how do hackers not get caught, hackers, undercover hackers, and When Hackers Get Caught. Chapters · 00:00 Profiling The People Who Cause Ranso...
🔥New Episode🔥 The Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime to ensure your online safety. CHAPTERS 00:00 Introduction: Why Your First Call During a Cyber Attack Matters 00:10 Welcome and Overview: Hospital Ransomware Scenario...











she's hot !!!!!!!!!