Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Crime Junkies. Host David Mauro Podcasts

1
Can you Spot AI Job Applicant Fraud? Think again!
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04On this Cyber Crime Junkies deep-dive, we expose how deepfake job applicants, AI-powered resumes, and AI voice-cloning are turning remote hiring into the ultimate con. Real-world cases include executives duped by glitchy interview bots—and one bizarre scam channeling funds to international criminals. 👨💻 What you’ll discover: · AI resume generators…
…
continue reading

1
Cyber Security Differences Between US Versus UK
45:17
45:17
Play later
Play later
Lists
Like
Liked
45:17Richard Hollis of Risk Crew (https://www.riskcrew.com) in London joins Cyber Crime Junkies studio (https://cybercrimejunkies.com) for exclusive discussion on: cyber security differences between US versus UK, how cybersecurity efforts usually fail and Difference between customers or enemies. Don't miss the video episode: https://youtu.be/5jjlJx_EyXI…
…
continue reading
Video Episode here! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Background 08:10 Financial Aspects of Ransomware Operations 24:…
…
continue reading

1
Shocking New Ways to Stop Hackers 🔥 What You Must Know
50:09
50:09
Play later
Play later
Lists
Like
Liked
50:09In this episode of Cyber Crime Junkies, host David Mauro speaks with cybersecurity expert Adam Benwell, CEO of Challenge Word, about new ways to stop social engineering, Shocking New Ai Risks & How To Stop Them Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach…
…
continue reading

1
Hackers vs Businesses Leaders XX Battle of Cyber Interruption XX
21:26
21:26
Play later
Play later
Lists
Like
Liked
21:26This conversation delves into Hackers vs Businesses Leaders. Battle of Cyber Interruption. It delves into the alarming rise of ransomware attacks, their impact on businesses and healthcare, and the evolving landscape of cybercrime. It highlights the staggering financial costs, the organized nature of cybercriminal operations, and the legal implicat…
…
continue reading

1
Deceptive Realities: Unmasking the Threat of Deep Fakes in Cybersecurity
1:12:34
1:12:34
Play later
Play later
Lists
Like
Liked
1:12:34Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fakes. Takeaways Sample deepfakes are played. Can you tell?…
…
continue reading

1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Under…
…
continue reading
Many leaders have concerns about employees using AI safely. We explain how to do so in this video. Today we sit with Bill Kleyman-founder of Apolo.us, a pioneer and leader in the space about his efforts for the safe use AI and how to reduce risks with employee use of AI. This is the story of Bill Kleyman and how AI can be used for good Find more he…
…
continue reading

1
Why Hackers Target YOU. Dark Web EXPOSED.
58:40
58:40
Play later
Play later
Lists
Like
Liked
58:40Host David Mauro interviews Jeremy Samide, CEO of Blackwired, about why hackers target you. We expose the latest dark web secrets, and the latest social engineering risks. Find more about Blackwired here: https://www.blackwired.com/ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at…
…
continue reading

1
How To Avoid Business Interruption. What Leaders Must do.
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Interview of Host David Mauro on topics of How To Avoid Business Interruption. What Leaders Must do. Covering true healthcare breaches which have killed and effected medical care along with small business guidance. Topics include: how to avoid business interruption, what business leaders need to know about cyber attacks, when ransomware kills, how …
…
continue reading

1
The Aftermath. Navigating Reputations and Protecting Your Brand Image
50:19
50:19
Play later
Play later
Lists
Like
Liked
50:19James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics dis…
…
continue reading

1
Hiring Fraud Exposed! Latest AI Threats to Business.
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
…
continue reading

1
Inside the Mind: Unveiling Cyber Criminals' Motives and the Real-World Dangers of Ransomware
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi). Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs and how they drive their ope…
…
continue reading

1
Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online 🚨 60 Million Students Exposed in PowerSchool Cyber Attack — What Parents Need to Know NOW A 19-year-old hacker named Matthew D. Lane pulled off one of the largest education data breaches ever, targeting PowerSchool and exposing the personal information of o…
…
continue reading

1
Hacking Big Tech. Bryan Seely Interview.
1:04:17
1:04:17
Play later
Play later
Lists
Like
Liked
1:04:17Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. C…
…
continue reading
🔥 New Episode Alert 🔥 In this exciting discussion, CISSP security leader Braxton Molton and host David Mauro on why you’re not too small to be hacked, the importance of detection and we explain How Small Business Can Catch Hackers. The message is clear on why small business needs better security. Exclusive insight from the front lines. Send us a te…
…
continue reading

1
Face of Cybercrime. How Cyber Attacks Kill Patients.
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00Welcome to Bainbridge, Georgia—where a cyber attack turned Memorial Hospital into a warzone of blinking screens and silent phones. This isn't sci-fi. It's the chilling truth of how ransomware can lead to real-world deaths. In this episode, we unpack the battle between Embargo and Memorial Health, and reveal the emotional and life-threatening toll o…
…
continue reading

1
How Everyone Is Responsible For Cyber Security. Phantom CISO.
1:00:11
1:00:11
Play later
Play later
Lists
Like
Liked
1:00:11Mishaal Khan, Best-selling Author of The Phantom CISO, Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how everyone is responsible for cyber security. https://www.phantomciso.com/ https://www.operationprivacy.com/ Send us a text Gro…
…
continue reading

1
After the Blast: How One CEO Fought Back 💥 | A True Crime
1:20:16
1:20:16
Play later
Play later
Lists
Like
Liked
1:20:16Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how to get prepared in this True Cyber Crime Story. Send us a text Growth without Interruption. Get peace of m…
…
continue reading

1
Caught: The Williams Woods Identity Theft Story - A Shocking Twist.
42:29
42:29
Play later
Play later
Lists
Like
Liked
42:29The Williams Woods Story. What Happens when Your Identity is Stolen. Video Episode: https://youtu.be/mBU3J-4vKww Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our …
…
continue reading

1
Shark in the Water! Quantifying Your Chances of Getting Hacked 🔥
58:25
58:25
Play later
Play later
Lists
Like
Liked
58:25🔥New Episode🔥 Former Intelligence Officer, Dan Elliott, current head of Zurich Resilience, joins us and we discuss: 🎯new ways to fight cyber crime, 🎯how to get prepared for a breach, and 🎯how to manage risk in small business. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-77…
…
continue reading

1
Overcoming Bias in Tech and Cybersecurity.
43:22
43:22
Play later
Play later
Lists
Like
Liked
43:22Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in cyber security, joins us. Come learn benefits of attending security conferences, best ways to keep up to date on security news, and ways to stop bias in cyber security. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact N…
…
continue reading

1
FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
…
continue reading

1
New Alert 🚨 Beware of Your Next Google Search🚨
1:55
1:55
Play later
Play later
Lists
Like
Liked
1:55👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
…
continue reading

1
CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson.
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to co…
…
continue reading