Discover
Cyber Crime Junkies

Cyber Crime Junkies
Author: Cyber Crime Junkies. Host David Mauro.
Subscribed: 208Played: 2,634Subscribe
Share
© 2025 David Mauro and Cyber Crime Junkies
Description
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
278 Episodes
Reverse
In the world of cybersecurity, there are big lies that have been perpetuated about compliance, fixability and communication--and it's time to burn it all down and start over. Many experts see one main cybersecurity truth, especially about AI, SIEM, EDR and related business technology. By examining the intersection of AI, cybersecurity, and compliance, we can gain a deeper understanding of the lies that have been told about the state of cybersecurity and work towards a more secure futur...
Jamey Davidson, Partner at international law firm O’Hagan Meyer concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: Cyber Attack Lawsuits: How to Avoid the LitigationHow Cyber Breach Litigation WorksWhy Security Layers Help Defend Against Law Suits Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get Net...
Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview02:49 Shining a Light on the Victim's Perspective10:00 Creating a Seamless User Experience12:23 The Role of Behavioral Biometrics in Fraud Detection15:16 Distinguishing Between Legitimate Users and Cyber Criminals20:06 The Ecosystem of Credit Card Fraud and Identity Theft26:15 Bank Liability and Fraud28:09 Common Scams36:03 Pig Butchering Scams39:27 Crypto Investmen...
Welcome to Cyber Crime Junkies—where cybersecurity finally meets binge-worthy storytelling. Join Our Community. Choose a PLAYLIST! Protect your personal data and online identity from cyber threats with this comprehensive guide to cybersecurity 101! In today's digital age, it's crucial to prioritize internet safety and secure browsing habits to avoid falling victim to identity theft and other malicious attacks. By adopting good cyber hygiene practices, you can significantly reduce the ri...
Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work at the Kennedy Space Center10:14 The Importance of Healthcare Security20:45 The Risks and Implications of Deepfake Technology25:51 Introductio...
Legendary Expert John Hammond. Exclusive. Learning How To Hack And Turn It Into A Career with topics: Newest security expert insight, best cybersecurity practices for business, how capture the flag exercises help, and How To Protect Security Of Organizations With Artificial Intelligence. Huntress: https://www.huntress.com/ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT....
Tavi Gallego, founder of a new crypto exchange:the Global Investment Crypto Exchange based here in US Midwest joins us. We discuss how to bring social responsibility to crypto. Don't Miss The Video Episode here: https://youtu.be/0xxn7jAdSRw Topics: non profit approaches to crypto currency, benefits of charity through crypto currency, charity through crypto currency, new approaches for crypto currency exchanges, crypto currency exchanges pros and cons, top benefits of crypto currency e...
New Episode! Tell us your feedback! Is Your Company Safe From AI Attacks? This episode covers the intersection of artificial intelligence and cybersecurity, exploring how AI can be used for both protection and malicious purposes. We examine how AI is used to create advanced ai cybercrime and deep fakes, and the rising threat of social engineering attacks. Learn how ai cybersecurity can help defend against ai hackers and other emerging threats. Feeling Kind? Consider Supporting Our Chan...
Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World. We discuss: Common misconceptions and Parental Challenges todayThe Role and Responsibilities Social Media companies have and should haveBest Practices and Practical Suggestion to manage the tech your children are usingHow to Monitor their online activity without invading their privacyWarnings signs to look forMarkers indicating mor...
New Episode with Special Guest John McLaughlin. Keeping your brand out of the news from a reputation-damaging data breach is top priority for sound leadership. Keeping criminal hackers out of your private information and stopping them from having unauthorized access to data they have no right to access, often depends on one critical factor: identifying who the person is. How an organization verifies (authenticates) users is the process by which security is kept and a brand is pro...
Joined by Joseph Brunsman discussing how to avoid cyber insurance mistakes, biggest cyber insurance mistakes to avoid, and how to transfer risk for SMBs. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data ...
This conversation explores the rapid advancements of AI in healthcare, emphasizing the importance of compliance and the risks associated with shadow AI. It discusses the necessity of prompt training for safe AI usage, the evolving threats of ransomware and social engineering, and the implications of deepfakes in cybersecurity. The conversation concludes with a focus on emerging threats like prompt injection and QR code risks, highlighting the need for awareness and proactive measures in...
Joe Casanova joins us. Joe is the founder and CEO of Furlough, a thriving digital ecosystem of more than 20k entrepreneurs, brand owners, marketers, and digital pros that fosters career-upskilling and business growth via collaboration. Joe has a decade of experience helping brands to grow and innovate across the e-commerce, influencer, tech, and beauty spaces, and now uses his expertise as a mentor for entrepreneurs and brand owners, helping them to scale their business, brand, and/or career....
Ever wondered what really happens in a cyber crime manhunt and take-down? What the FBI actually does in cybersecurity? How they help the publc? Today we got the rare chance to sit down with Special Agent with the FBI’s Cyber Crime Division (RET.), Scott Augenbaum. He shares practical ways how to protect yourself online. His model called the Four (4) Truths is an insightful framework. Gain an FBI Perspective to protecting yourself online. This is the story of former FBI special agent Sco...
Don't let your small business fall victim to devastating cyber attacks! Expert joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com ...
This is the story of AI and Your Privacy. Digital Citizenship Today. Antoinette King, Author of the book Digital Citizens Guide to Cybersecurity. She is the founder of Credo Cyber Consulting, LLC, who has over 20 years of experience in the security industry, from physical security to digital security. Grab her book: https://www.amazon.com/Digital-Citizens-Guide-Cybersecurity-Empowered/dp/1956464220 Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetG...
David Mauro and co-host Zach Moskow engage with Kevin McGrew, author of 'The New Rules of Marketing Warfare.' They discuss the intersection of marketing and leadership, emphasizing the importance of frameworks in business strategy. Kevin shares insights on the SMAC framework (Shoot, Move, Adapt, Communicate) and how it can help businesses navigate challenges. The conversation also explores the impact of AI on marketing, the necessity of adaptability, and the future of business leadership in a...
Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving landscape of ransomware as a service and the implications for businesses and national security. Send us a text Growth without Interruption. Get pea...
This is the true cyber crime story of Lamborghini Carjackers Lured by a $243M Cyber heist, a dive into crypto fraud cases and how cyber crime turns violent. This episode explores the dramatic rise and fall of Ray Diaz, a young man entangled in a world of cybercrime, luxury, and violence. It delves into the consequences of doxxing, the ruthless nature of cybercriminal networks like the COM, and the failed kidnapping plot that led to a shocking $243 million cryptocurrency heist. The narra...
We are joined today by special guest, former FBI special agent Nancy Aguilar, who had worked the Boston Marathon Bombing and other high-profile investigations. She is also the host and creator of Baddass in heels: https://badassinheels.com/ We discuss: FBI Profiling and negotiation, FBI Profiling and counter terrorism, and other key topics: how fbi negotiates, how fbi negotiations are used in cyber crime, how cyber crime negotiations work, fbi profiling in cyber crime, how fbi profili...
she's hot !!!!!!!!!