ПодборкаCyber Crime Junkies
Cyber Crime Junkies

Cyber Crime Junkies

Автор: Cyber Crime Junkies. Host David Mauro.

Подписка оформлена: 143Воспроизведенные: 1,846
поделиться

Описание

Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk.

Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

221 Episodes
Reverse
Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. Connect with Bryan: www.bryanseely.comSend us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain....
We explore the breaking scandal that is set for trial this Winter.Send us a text🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junki...
Brian Scumadmore, founder and serial entrepreneur, known for pioneering the professional junk hauling industry with 1-800-GOT-JUNK tells a riveting story of how he founded the organization and grew it across several countries. A familiar guest on Oprah and other Dont Miss the Video Episode!: https://youtu.be/cd34lHwSBi4 Topics: culture driving scalability, how 1-800-got-junk was founded, story of 1-800-got-junk, how culture drives scalability, building a business culture driving growth, ...
🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime.Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to commit cyber crimes.A must-watch for anyone interested in cybersecurity, the criminal mindset, and the transformative journey from crime to redem...
David Mauro and DeWayne Hart explore the critical aspects of building a cyber security mindset, understanding cyber security awareness, internet governance in cyber security, and importance of culture in cybersecurity. Send us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio...
This conversation delves into Emerging Tech Changed Everything. Food. Medicine. Crime. Covering the alarming rise of ransomware attacks, their impact on businesses and healthcare, and the evolving landscape of cybercrime. It highlights the staggering financial costs, the organized nature of cybercriminal operations, and the legal implications for companies. The discussion also emphasizes the urgent need for robust cybersecurity measures and the importance of preparedness in the face of t...
Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over Data Privacy, and why protecting online privacy is important.SummaryThe conversation explores the topics of data privacy, government surveillance, and underreporting of crimes. Kurt Long, CEO of Bunker and an expert in privacy and information security, discusses the risks associated with leaving a digit...
We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Send us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at w...
Join us as Cody Kretsinger shares his journey from the blind arrogance of youth and dark side of hacking to his evolution into the brilliant, community thought leader and leading-edge cybersecurity provider. It’s a unique perspective on protecting against cybercrime and understanding Modus operandi.Chapters00:00 Introduction to Cybercrime and Hacking07:00 The Thrill of Finding Vulnerabilities13:40 The Role of the NSA in Cybersecurity18:24 The Sony Pictures Hack: Exposing Laughable Secur...
Cyber Crime Junkies Podcast Host David Mauro and producer Jay have discussion about latest Small Business Cybersecurity Risks and how many are asleep at the wheel.Send us a text🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews....
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQExamples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cyber crime gangs including EXCLUSIVE DISCUSSION ON BLACK CAT RANSOMWARE GANG and Anatomy of a Social Engineering attack. Topics: understanding cyb...
Many leaders have concerns about employees using AI safely. We explain how to do so in this video. Today we sit with Bill Kleyman-founder of Apolo.us, a pioneer and leader in the space about his efforts for the safe use AI and how to reduce risks with employee use of AI. This is the story of Bill Kleyman and how AI can be used for goodFind more here: https://www.apolo.us/Send us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today...
Shocking True Crime Stories. Baby Al Capone, Swatting & SIM Swaps Mind-blowing episode about Violence-as-a-service, Dark Web forums, Deadly Swatting events and the unbelievable story of a 15 year old affluent suburban child who became legendary as Baby Al Capone.Our mission is to keep you, your family and your organization's brand safe. Nothing technical or boring. Through humor and real-life stories we make sense of Cybersecurity.Send us a textGrow without Interruption. Stop Breache...
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber ...
This conversation delves into Hackers vs Businesses Leaders. Battle of Cyber Interruption. It delves into the alarming rise of ransomware attacks, their impact on businesses and healthcare, and the evolving landscape of cybercrime. It highlights the staggering financial costs, the organized nature of cybercriminal operations, and the legal implications for companies. The discussion also emphasizes the urgent need for robust cybersecurity measures and the importance of preparedness in the...
Video Episode here!Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT.Chapters00:00 Introduction and Background08:10 Financial Aspects of Ransomware Operations24:33 Technical Skills and Criminal Intent39:46 The Self-Convening Justice System in the Criminal Underground48:31 The Importance of Effective Communicatio...
The US has signed into new law the Ban of Tik Tok effective in January. What does this mean? We have three segments to share. The first is the latest update from a few months back. The second is an in-depth discussion around the complete Tik Tok Ban saga alongside former FBI agent Darren Mott. Darren shares exclusive behind the scenes information on the Ban and the story you wont find elsewhere. The Last segment we will share is is the distrubing criminal trends, crime tutorials and other in...
Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in cyber security, joins us. Come learn benefits of attending security conferences, best ways to keep up to date on security news, and ways to stop bias in cyber security.Send us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? Y...
Exclusive interview with Perry Carpenter, a multi-award-winning author, podcaster, and cybersecurity expert. Perry's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, offers invaluable insights into navigating the complexities of AI-driven deception. Send us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.N...
Joining us is Matthew Rosenquist, a massively followed thought leader and Top Voice. A renowned CISO, Cybersecurity leader and strategist, we discuss the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks. Send us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com ...
loading