Discover
Cyber Crime Junkies
Cyber Crime Junkies
Author: Cyber Crime Junkies. Host David Mauro.
Subscribed: 219Played: 2,755Subscribe
Share
© 2025 Dean Mauro and Cyber Crime Junkies
Description
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
283 Episodes
Reverse
Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect you...
Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling true crime story. Eric O'Neill, a former FBI operative, discusses his experiences in espionage, particularly focusing on the case of Robert Hanse...
Question? Text our Studio direct. A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy. The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution of multiple double agents and triggering the worst intelligence breach in U.S. history. 🕵️♂️🔥 In this episode, we break down how a 26-year-old u...
Question? Text our Studio direct. What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis. In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Comprom...
Question? Text our Studio direct. Discover the shocking story of Charlie Javice, the entrepreneur who went from being featured on the cover of Forbes to facing a federal indictment. Learn about her rise to fame and the events that led to her downfall. Get the inside scoop on the controversies surrounding her business ventures and the charges brought against her. From the highs of entrepreneurial success to the lows of legal troubles, this video explores the fascinating and complex tale of Cha...
Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINI...
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Background08:10 Financial Aspects of Ransomware Operations24:33 Technical Skills and Criminal Intent39:46 The Self-Convening Justice System in the Crimina...
Question? Text our Studio direct. Join us as we delve into the uncharted territory where artificial intelligence meets modern warfare, exploring the profound implications and potential consequences of this revolutionary intersection. From autonomous drones to predictive analytics, we'll examine how AI is transforming the face of combat and defense strategies. Discover the latest advancements, ethical considerations, and future directions in this fascinating realm where technology and wa...
Question? Text our Studio direct. Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security. In this conversation, host David Mauro engages with Carlo Tortora Brayda and Michael Tiesemer, leaders of the Cyber Eagle Project, to discuss the future of AI in Cyb...
Question? Text our Studio direct. CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025. Don't miss out on crucial information about the CMMC 2025 deadline. The Cybersecurity Maturity Model Certification is a vital requirement for businesses dealing with the Department of Defense...
Question? Text our Studio direct. What Are The BIGGEST Cyber Security Risks In SaaS Platforms? How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-service platforms. It leverages AI which automates the protection of sensitive information...
Question? Text our Studio direct. When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance. We break down: 💥 The $550M AWS outage & how it spread chaos 🧩 Why our phones prove digital dependence is real 🤖 Amazon’s leaked plan t...
Question? Text our Studio direct. New Episode🔥This one explores why news outlets focus on the aftermath of a data breach but rarely on the lives impacted. We discuss cybersecurity in the age of AI dangers and its impact on individuals. It's time we address what is cybercrime, the resulting cyber threats, and data protection including identity theft. Download your Take-Home Resources of Best Practices (No cost) here: https://offers.netgainit.com/psi-resources KEY TAK...
Question? Text our Studio direct. What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP? At 17, he left his Caribbean home and came to the US. After initial struggles she landed a job and after inserting his way into a tech issue, the trajectory of his career changed and he now sits as the Chief Field CTO for the Americas at Crowdstrike. Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www...
Question? Text our Studio direct. New Episode🔥We explore the often overlooked connection between a significant data breach and mental health, focusing on the resulting anxiety and cyber security concerns. We discuss how data security impacts identity theft and the rising rates of cyber attack. It's time we address the emotional fallout from these incidents. Learn Cybersecurity Secrets Schools Never Teach. See how to unleash the best cybersecurity strategy to defeat hackers now and protect you...
Question? Text our Studio direct. A story like a crime thriller--all true. Legendary Security Researcher and Author, Jon DiMaggio, of Analyst1, joins us to discuss his undercover investigation and exposure of the inner working of one of the top cyber crime gangs on the planet: LOCKBIT. Jon DiMaggio’s latest blockbuster report Ransomware Diaries VOL 3: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/. Growth without Interruption. Get peace of mind. Stay ...
Question? Text our Studio direct. Paul Eckloff was a US Secret Service Agent for 23 years. 14 of which were spent protecting the US Presidents. Before that? Paul was a High School Teacher. Today? Paul is one of the top cybersecurity, privacy and data experts in the world and a leader with Lexis/Nexis Risk Solutions. Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Sup...
Question? Text our Studio direct. What's Next for Humanity with Artificial Intelligence? David Mauro interviews Mike Acerra, the president and founder of Luxblox, about AI and its role in humanity. They discuss the evolution of technology, from typewriters to computers, and the impact of AI on various industries. Mike shares the story of how Luxblox was created and how it encourages creativity and problem-solving. They also touch on the importance of independent verification when using AI-gen...
Question? Text our Studio direct. This episode explores the rise and controversies of Uber, including its inception, expansion, rebranding, leadership changes, autonomous vehicle program, protests, toxic culture, and legal troubles. It also delves into the significance of a major data breach, the trial of Joe Sullivan, Uber's former chief security officer, and recent fines assessed against the company. Chapters 00:00 Introduction: Uber's Data Breaches02:22 The Importance of Data Pro...
Question? Text our Studio direct. 🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover, Exposed Secrets Of Cyber Crime Gangs, Profiling The People Who Cause Ransomware Attacks, how do hackers not get caught, hackers, undercover hackers, and When Hackers Get Caught. Chapters · 00:00 Pr...














she's hot !!!!!!!!!