Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Cyber Crime Junkies. Host David Mauro public
[search 0]
Download the App!
show episodes
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Loading …
show series
 
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
  continue reading
 
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
  continue reading
 
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
  continue reading
 
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
  continue reading
 
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
  continue reading
 
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
  continue reading
 
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
  continue reading
 
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents high…
  continue reading
 
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cybe…
  continue reading
 
What if the hackers are actually the heroes? In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threa…
  continue reading
 
We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Send us a text Growth witho…
  continue reading
 
🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to co…
  continue reading
 
Chris Hadnagy, Best-selling author, security expert and CEO of Social Engineer, LLC, join sus to discuss hacking humans using sacience. Topics: understanding science in social engineering, hacking humans using science, neuroscience behind social engineering, science supporting social engineering, psychology of social engineering explained, how neur…
  continue reading
 
Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on US Businesses and Innovation Insi…
  continue reading
 
There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Send us a text Growth without Interruptio…
  continue reading
 
🚨New Episode 🚨We dive into PowerSchool Exposed-- Children at Risk at School, about the significant cybersecurity breach at PowerSchool, which exposed sensitive data of millions of students and teachers. It emphasizes the importance of transparency, accountability, and robust cybersecurity measures in protecting sensitive information. Takeaways Cybe…
  continue reading
 
We expose and discuss the rise and fall of genetic testing company 23andMe. On September 13th, 2024 the once popular genetic testing company “23andMe” agreed to a $30 million settlement stemming from a data breach that affected nearly 7 million users. The next day, on September 14th every single board member resigned. Victims of the data breach are…
  continue reading
 
This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict. The technology never worked as promised. Was her intent to hope that the tech would “catch up” to what they had promised investors and regulators? Or had Theranos and Elizabeth Holmes crossed the line of NO return when t…
  continue reading
 
Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we spot fraud in business. We discuss how to protect families online, latest security expert insigh…
  continue reading
 
The conversation delves into the rise and fall of Charlie Javice, a once-celebrated fintech entrepreneur whose startup, Frank, promised to revolutionize student financial aid. However, her claims of a vast user base were fabricated, leading to a high-profile trial for fraud. The discussion highlights the implications of her actions on Silicon Valle…
  continue reading
 
This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
  continue reading
 
🔥 Stay with us as we explore The SONY hack-decoded and take you Behind Scenes with a Real Hacker. In this episode we go Behind Scenes with A Real Hacker where Cyber Crime Junkies, host David Mauro, interviews Cody Kretsinger, a former Lulzsec member, exploring the Sony Hack Decoded. Guest Cody Kretsinger shows us how hacktivists help keep businesse…
  continue reading
 
Expert Ayelet Biger of Scam Rangers joins us for Shocking Fraud Attempts To Watch Out For and even more shocking ways to protect personal data and best practices fraud protection. We address newest stories on account take overs and discussed how to protect families online, how can we spot fraud in business, how to protect employees online, how to p…
  continue reading
 
Gabriel Friedlander, founder of Wizer Security, join us. Founded in 2019 and now in over 20k organizations across 50 countries, including the great local city of Indianapolis Indiana in heartland of the US Wizer training demonstrates how to build a security culture and believes today security awareness should be a basic life skill. Topics: how to b…
  continue reading
 
Summary This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of control…
  continue reading
 
Loading …
Listen to this show while you explore
Play