DiscoverCyber Crime Junkies
Cyber Crime Junkies

Cyber Crime Junkies

Author: Cyber Crime Junkies. Host David Mauro.

Subscribed: 223Played: 2,887
Share

Description

Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime.

Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast


Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.

301 Episodes
Reverse
New Episode🔥The Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Support the show 🔥New Exclusive Offers for our L...
NIKE ROBBED! Not What You Think. The Cybercrime Junkies show dives into the Nike Breach, the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Support ...
Hackers aren’t stealing passwords anymore. They’re stealing what makes companies valuable. We cover: • The European Space Agency breach and why even elite organizations aren’t safe • Pig butchering romance scams and how social engineering targets human psychology • The Nike data breach where attackers stole intellectual property, not customer data • AI voice cloning, deepfake scams, and real-world fraud attempts • Why modern cybercrime looks more like organized c...
Nike's Worst Nightmare Just Happened. The Cybercrime Junkies show dives into the NIKE breach, the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Suppo...
Hackers stole The HEART of Nike. | A Nightmare! The Cybercrime Junkies show dives into the NIKE BREACH and what it means, covering the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime. Questions? Text our Studio direct. We read these and when helpful we give a special sho...
AI Changed Social Engineering. New Verification Rules to Know TODAY! If you didn't independently confirm the human using a channel you know is legitimate, you didn't verify anything. You placed your trust in whatever entity controls that communication channel. And there's an increasing chance that entity is a criminal enterprise with better AI tools than your security team. Stop checking emails. Start checking humans. The difference could be your career—or your company's survival. Questions? ...
New Episode🔥We explore the importance of proper AI adoption, NIST AI risk management framework and regulatory compliance. Understanding ai governance and having a clear ai policy are crucial for effective ai for business.🔥The Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay infor...
New Episode🔥Guest Dan Elliott (vCISO with RECORDED FUTURE). We emphasize the critical need for robust vendor due diligence and continuous risk assessment to improve automation without compromising security. Understanding artificial intelligence and its ai risks is no longer a future problem, but a present challenge. This episode focuses on the stark reality of cyber risks, moving past sensationalized portrayals to examine how attacks actually happen through overlooked vendors and the AI tools...
Have you ever noticed how we keep telling ourselves cyber risk is a “future problem” right up until it walks in the front door wearing a name badge? Because in this episode, we’re not talking about Hollywood hackers or hoodie clichés. We’re talking about how attacks actually happen now. We interview global vCISO Dan Elliott from Recorded Future all about it. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Gr...
Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pr...
Why modern cybercrime targets trust, urgency, and decision-making instead of systems Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works Traditional fraud used to feel obvious: misspellings, odd links, weird emails. Now? Deepfakes embed perfectly familiar voices and faces into your feed — or your inbox. Listen to Perry Carpenter on this. If you love this topic as much as we do grab Perry's incredible book FAIK available everywhere. Here's a non-affiliated link: https://...
Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work at the Kennedy Space Center10:14 The Importance of Healthcare Security20:45 The Risks and Implications of Deepfake Technology25:51 Introductio...
Most cybercrime doesn’t start with genius hackers. It starts on a Tuesday. Someone’s busy. An email feels urgent. And a decision gets made five seconds too fast. Fear-based cybersecurity training hasn’t made people safer. It’s made them tired. Most cyber attacks don’t start with genius hackers. They start with rushed decisions, social engineering, and skipped updates. This short breaks down ai explained in plain English, why cybersecurity for beginners often gets taught the wrong way, a...
We’ve trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates. Cybercrime doesn’t win because it’s smart. It wins because people are tired. We’ve been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day. The boring truth that actually works: • Don’t get tricked • Patch your systems That’s it. Not sexy. Not cinematic. But it works. Questions? Text our Studio di...
Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving landscape of ransomware as a service and the implications for businesses and national security. Questions? Text our Studio direct. We read these an...
Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how to get prepared in this True Cyber Crime Story. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact ...
New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack strategy now directly targets customers and patients, demonstrating how ransomware works to affect executives and businesses alike. Stay informed about these digital threats with our ex...
Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses identity verification challenges. We discuss how to reduce risk from multi factor authentication, explore mobile-based identity verification as well...
What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Understand, Manage, and Measure Cyber Risk®,Practical Solutions for Creating a Ryan has decades of experience as a Cyber Expert for McKinsey &...
New Episode🔥🔥The Cybercrime Junkies show discusses contemporary `cyber security` challenges, emphasizing that older notions of threats are outdated. We dive into how direct `hacking` via `wifi` can lead to gaining `root` access, and how quick action is needed to mitigate these `exploit`s. Stay informed to protect your systems from `cyber crime` and ensure proper `shell` access management. ========================================================== 00:00 Cold Open – Welcome to Chaos 01:...
loading
Comments (1)

Adam Balogh

she's hot !!!!!!!!!

Sep 21st
Reply