Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

BEHIND SCENES of REAL Data Breach Response

1:01:53
 
Share
 

Manage episode 519306382 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Question? Text our Studio direct.

What really happens during a cyber attack?
Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.

In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.

You’ll see how attacks start, how fast they spread, what attackers do once they’re inside your email, and the exact steps that decide whether a company recovers… or collapses.

What You’ll Learn:
• How a phishing email turns into credential theft and internal compromise
• Why Business Email Compromise (BEC) is now the #2 most expensive breach type
• The tricks attackers use to hide inside inboxes and impersonate executives
• How wire transfer fraud really happens — and how the 2-person rule stops it
• What zero-days look like in the wild (and why patches aren’t enough)
• The role of MFA, phishing-resistant MFA, email controls, and layered security
• Why backups must be immutable, air-gapped, and isolated
• How incident response teams contain malware without destroying evidence
• When to call cyber insurance, law enforcement, and breach counsel
• The IR playbook: detection → containment → communication → forensics → recovery

Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos:

🔥 Interviews with spies & double agents 💥 Cyber WTF moments 🎮 New interactive segments & games 🛡️ Business-grade cybersecurity insights 😂 More humor, more banter, more chaos

Hit SUBSCRIBE

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Support the show

🔥New Exclusive Offers for our Listeners! 🔥

Dive Deeper:
🔗 Website: https://cybercrimejunkies.com

📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief

✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/
📸 Instagram: https://www.instagram.com/cybercrimejunkies/

===========================================================

  continue reading

288 episodes

Artwork
iconShare
 
Manage episode 519306382 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Question? Text our Studio direct.

What really happens during a cyber attack?
Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.

In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.

You’ll see how attacks start, how fast they spread, what attackers do once they’re inside your email, and the exact steps that decide whether a company recovers… or collapses.

What You’ll Learn:
• How a phishing email turns into credential theft and internal compromise
• Why Business Email Compromise (BEC) is now the #2 most expensive breach type
• The tricks attackers use to hide inside inboxes and impersonate executives
• How wire transfer fraud really happens — and how the 2-person rule stops it
• What zero-days look like in the wild (and why patches aren’t enough)
• The role of MFA, phishing-resistant MFA, email controls, and layered security
• Why backups must be immutable, air-gapped, and isolated
• How incident response teams contain malware without destroying evidence
• When to call cyber insurance, law enforcement, and breach counsel
• The IR playbook: detection → containment → communication → forensics → recovery

Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos:

🔥 Interviews with spies & double agents 💥 Cyber WTF moments 🎮 New interactive segments & games 🛡️ Business-grade cybersecurity insights 😂 More humor, more banter, more chaos

Hit SUBSCRIBE

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Support the show

🔥New Exclusive Offers for our Listeners! 🔥

Dive Deeper:
🔗 Website: https://cybercrimejunkies.com

📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief

✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/
📸 Instagram: https://www.instagram.com/cybercrimejunkies/

===========================================================

  continue reading

288 episodes

Alla avsnitt

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play