Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading

1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:36:41
1:36:41
Play later
Play later
Lists
Like
Liked
1:36:41Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
…
continue reading

1
New Alert 🚨 Beware of Your Next Google Search🚨
1:55
1:55
Play later
Play later
Lists
Like
Liked
1:55👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
…
continue reading

1
New Alert. 🚨 Don't Fall For The New Google Subpoena🚨
1:39
1:39
Play later
Play later
Lists
Like
Liked
1:39📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
…
continue reading

1
Zero Trust, SMB & National Security. INTEL CTO Exclusive.
1:01:40
1:01:40
Play later
Play later
Lists
Like
Liked
1:01:40Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
…
continue reading

1
Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
58:15
58:15
Play later
Play later
Lists
Like
Liked
58:15David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
…
continue reading

1
How start a career in cybersecurity today. Josh Mason
56:21
56:21
Play later
Play later
Lists
Like
Liked
56:21Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
…
continue reading

1
Zero Trust. Social Engineering. Ron Woerner.
44:18
44:18
Play later
Play later
Lists
Like
Liked
44:18Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
…
continue reading
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents high…
…
continue reading

1
Hunting Down Hackers. John Hammond Exclusive.
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cybe…
…
continue reading

1
🔥 How Hackers Can Protect Your Business | AI Risks & DEF CON Secrets🔥
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42What if the hackers are actually the heroes? In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threa…
…
continue reading

1
Mind Games: Exploring Brain Reactions in Social Engineering
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Send us a text Growth witho…
…
continue reading

1
CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson.
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to co…
…
continue reading
Chris Hadnagy, Best-selling author, security expert and CEO of Social Engineer, LLC, join sus to discuss hacking humans using sacience. Topics: understanding science in social engineering, hacking humans using science, neuroscience behind social engineering, science supporting social engineering, psychology of social engineering explained, how neur…
…
continue reading

1
The Undetected. Espionage and Spies.(Part 2)
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on US Businesses and Innovation Insi…
…
continue reading

1
The Undetected. Espionage and Spies.(Part 1)
31:08
31:08
Play later
Play later
Lists
Like
Liked
31:08There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Send us a text Growth without Interruptio…
…
continue reading

1
PowerSchool Exposed-🔥-Children at Risk at School
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48🚨New Episode 🚨We dive into PowerSchool Exposed-- Children at Risk at School, about the significant cybersecurity breach at PowerSchool, which exposed sensitive data of millions of students and teachers. It emphasizes the importance of transparency, accountability, and robust cybersecurity measures in protecting sensitive information. Takeaways Cybe…
…
continue reading

1
The Shocking Rise and Fall of 23andMe. Exposed.
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31We expose and discuss the rise and fall of genetic testing company 23andMe. On September 13th, 2024 the once popular genetic testing company “23andMe” agreed to a $30 million settlement stemming from a data breach that affected nearly 7 million users. The next day, on September 14th every single board member resigned. Victims of the data breach are…
…
continue reading

1
Start-Up Fraud Stories. How They Caught Elizabeth Holmes.
52:05
52:05
Play later
Play later
Lists
Like
Liked
52:05This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict. The technology never worked as promised. Was her intent to hope that the tech would “catch up” to what they had promised investors and regulators? Or had Theranos and Elizabeth Holmes crossed the line of NO return when t…
…
continue reading

1
Spotting Fraud Before it's Too Late. Brett Johnson Exclusive.
47:36
47:36
Play later
Play later
Lists
Like
Liked
47:36Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we spot fraud in business. We discuss how to protect families online, latest security expert insigh…
…
continue reading

1
The FRANK Scandal Exposed-- When A Lie Becomes Criminal
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34The conversation delves into the rise and fall of Charlie Javice, a once-celebrated fintech entrepreneur whose startup, Frank, promised to revolutionize student financial aid. However, her claims of a vast user base were fabricated, leading to a high-profile trial for fraud. The discussion highlights the implications of her actions on Silicon Valle…
…
continue reading

1
FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
…
continue reading

1
Sony Hack Decoded--Behind Scenes with A Real Hacker
51:19
51:19
Play later
Play later
Lists
Like
Liked
51:19🔥 Stay with us as we explore The SONY hack-decoded and take you Behind Scenes with a Real Hacker. In this episode we go Behind Scenes with A Real Hacker where Cyber Crime Junkies, host David Mauro, interviews Cody Kretsinger, a former Lulzsec member, exploring the Sony Hack Decoded. Guest Cody Kretsinger shows us how hacktivists help keep businesse…
…
continue reading
Expert Ayelet Biger of Scam Rangers joins us for Shocking Fraud Attempts To Watch Out For and even more shocking ways to protect personal data and best practices fraud protection. We address newest stories on account take overs and discussed how to protect families online, how can we spot fraud in business, how to protect employees online, how to p…
…
continue reading

1
How To Build A Security Culture. WIZER Security Founder.
34:05
34:05
Play later
Play later
Lists
Like
Liked
34:05Gabriel Friedlander, founder of Wizer Security, join us. Founded in 2019 and now in over 20k organizations across 50 countries, including the great local city of Indianapolis Indiana in heartland of the US Wizer training demonstrates how to build a security culture and believes today security awareness should be a basic life skill. Topics: how to b…
…
continue reading

1
From Hacker to Hero: The Michael Calce Story – How 'Mafia Boy' Took Down The Internet
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50Summary This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of control…
…
continue reading