Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Crime Junkies Host David Mauro Podcasts
1
From Forbes Fame to Federal Charges: The Shocking Tale of Charlie Javice!
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46Question? Text our Studio direct. Discover the shocking story of Charlie Javice, the entrepreneur who went from being featured on the cover of Forbes to facing a federal indictment. Learn about her rise to fame and the events that led to her downfall. Get the inside scoop on the controversies surrounding her business ventures and the charges brough…
…
continue reading
1
CAUGHT: Biggest Spy in US History--Spies, Lies & Cybercrime
54:07
54:07
Play later
Play later
Lists
Like
Liked
54:07Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
…
continue reading
1
What Happens in Your BRAIN During Social Engineering Attacks
51:48
51:48
Play later
Play later
Lists
Like
Liked
51:48Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Growth without Interr…
…
continue reading
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
…
continue reading
1
What Happens When AI Collides with MODERN Warfare?
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Question? Text our Studio direct. Join us as we delve into the uncharted territory where artificial intelligence meets modern warfare, exploring the profound implications and potential consequences of this revolutionary intersection. From autonomous drones to predictive analytics, we'll examine how AI is transforming the face of combat and defense …
…
continue reading
1
Spies, Lies & Cybercrime--Treason from Inside The FBI
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56Question? Text our Studio direct. A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy. The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution …
…
continue reading
1
BEHIND SCENES of REAL Data Breach Response
1:00:09
1:00:09
Play later
Play later
Lists
Like
Liked
1:00:09Question? Text our Studio direct. What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis. In this full episode, we take you inside the anatomy of a real data breach w…
…
continue reading
Question? Text our Studio direct. Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security. In this conversati…
…
continue reading
1
This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41Question? Text our Studio direct. CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025. Don't miss out on crucial information about …
…
continue reading
1
What Are The BIGGEST Cyber Security Risks In SaaS Platforms?
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38Question? Text our Studio direct. What Are The BIGGEST Cyber Security Risks In SaaS Platforms? How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss preve…
…
continue reading
1
Digital Dependence EXPOSED--A Billion Dollar MELTDOWN & AI SECRETS
45:48
45:48
Play later
Play later
Lists
Like
Liked
45:48Question? Text our Studio direct. When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance. We break down: 💥…
…
continue reading
1
Understanding Ransomware Gangs: Key Information
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07Question? Text our Studio direct. David Mauro interviews Jon DiMaggio, a well-respected cybercrime investigator, delving into Understanding Ransomware Gangs: Key Information. Including the operations of LockBit, once the Top ransomware gang and now a Cyber Crime Gang Exposed. We discuss the Ransomware Take Down of #Lockbit, and how Jon’s research l…
…
continue reading
Question? Text our Studio direct. New Episode🔥This one explores why news outlets focus on the aftermath of a data breach but rarely on the lives impacted. We discuss cybersecurity in the age of AI dangers and its impact on individuals. It's time we address what is cybercrime, the resulting cyber threats, and data protection including identity theft…
…
continue reading
1
What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP?
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40Question? Text our Studio direct. What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP? At 17, he left his Caribbean home and came to the US. After initial struggles she landed a job and after inserting his way into a tech issue, the trajectory of his career changed and he now sits as the Chief Field CTO for the Americas at Crowdstrike. Gr…
…
continue reading
Question? Text our Studio direct. Titania Jordan, best-selling author and TV personality (Today Show, GMA etc) and CMO of Bark, joins us to discuss Parenting Today With Social Media. Key Topics: parenting today with social media, social media companies and parenting today, parenting today with tech addiction, holding social media companies accounta…
…
continue reading
1
Is Ransomware Dead? What Cyber Criminals Are Saying.
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Question? Text our Studio direct. Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tactics insight from the mouths of top cyber crime gang lead…
…
continue reading
1
Cybersecurity Secrets Schools Never Teach
1:37:40
1:37:40
Play later
Play later
Lists
Like
Liked
1:37:40Question? Text our Studio direct. New Episode🔥We explore the often overlooked connection between a significant data breach and mental health, focusing on the resulting anxiety and cyber security concerns. We discuss how data security impacts identity theft and the rising rates of cyber attack. It's time we address the emotional fallout from these i…
…
continue reading
1
Undercover Investigation. Top Cyber Crime Ransomware Gang EXPOSED. LOCKBIT
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16Question? Text our Studio direct. A story like a crime thriller--all true. Legendary Security Researcher and Author, Jon DiMaggio, of Analyst1, joins us to discuss his undercover investigation and exposure of the inner working of one of the top cyber crime gangs on the planet: LOCKBIT. Jon DiMaggio’s latest blockbuster report Ransomware Diaries VOL…
…
continue reading
Question? Text our Studio direct. Paul Eckloff was a US Secret Service Agent for 23 years. 14 of which were spent protecting the US Presidents. Before that? Paul was a High School Teacher. Today? Paul is one of the top cybersecurity, privacy and data experts in the world and a leader with Lexis/Nexis Risk Solutions. Growth without Interruption. Get…
…
continue reading
1
What's Next for Humanity with Artificial Intelligence?
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01Question? Text our Studio direct. What's Next for Humanity with Artificial Intelligence? David Mauro interviews Mike Acerra, the president and founder of Luxblox, about AI and its role in humanity. They discuss the evolution of technology, from typewriters to computers, and the impact of AI on various industries. Mike shares the story of how Luxblo…
…
continue reading
1
Why Hackers Target YOU. Dark Web EXPOSED.
58:00
58:00
Play later
Play later
Lists
Like
Liked
58:00Question? Text our Studio direct. Host David Mauro interviews Jeremy Samide, CEO of Blackwired, about why hackers target you. We expose the latest dark web secrets, and the latest social engineering risks. Find more about Blackwired here: https://www.blackwired.com/ Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Conta…
…
continue reading
1
What Happened to UBER?! Story of Trust Broken.
1:10:31
1:10:31
Play later
Play later
Lists
Like
Liked
1:10:31Question? Text our Studio direct. This episode explores the rise and controversies of Uber, including its inception, expansion, rebranding, leadership changes, autonomous vehicle program, protests, toxic culture, and legal troubles. It also delves into the significance of a major data breach, the trial of Joe Sullivan, Uber's former chief security …
…
continue reading
1
Most Wanted Dark Web Hackers. Truth about Scattered Spider.
46:54
46:54
Play later
Play later
Lists
Like
Liked
46:54Question? Text our Studio direct. 🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover, Exposed Secrets Of Cyber Crime Gangs, Profiling The People Who Cause R…
…
continue reading
1
Unlocking Online Safety for Families in an AI World
50:57
50:57
Play later
Play later
Lists
Like
Liked
50:57Question? Text our Studio direct. Unlocking Online Safety for Families in an AI World This conversation delves into the critical intersection of child safety and artificial intelligence in today's digital landscape. The speakers discuss the importance of teaching children to navigate online spaces safely, the risks associated with social media, and…
…
continue reading
1
Attack of the Deepfakes. New AI Risks for Business.
56:51
56:51
Play later
Play later
Lists
Like
Liked
56:51Question? Text our Studio direct. Exclusive interview with Perry Carpenter, a multi-award-winning author, podcaster, and cybersecurity expert. Perry's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, offers invaluable insights into navigating the complexities of AI-driven deception…
…
continue reading