Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Crime Junkies Host David Mauro Podcasts

1
When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58Cyber Flash Point on the following topics: how ransomware kills in real life and latest cyber crime news, Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Special Offers! 🔥 Remove Your Private Data Online …
…
continue reading

1
Identity and Brand Protection. Things We NEED to Know.
47:36
47:36
Play later
Play later
Lists
Like
Liked
47:36By Cyber Crime Junkies-David Mauro
…
continue reading

1
BIG LIES in Cybersecurity--Why We Need to Rebuild the Industry
52:53
52:53
Play later
Play later
Lists
Like
Liked
52:53In the world of cybersecurity, there are big lies that have been perpetuated about compliance, fixability and communication--and it's time to burn it all down and start over. Many experts see one main cybersecurity truth, especially about AI, SIEM, EDR and related business technology. By examining the intersection of AI, cybersecurity, and complian…
…
continue reading

1
Cyber Attack Lawsuits: How to Avoid the Litigation
1:03:17
1:03:17
Play later
Play later
Lists
Like
Liked
1:03:17Jamey Davidson, Partner at international law firm O’Hagan Meyer concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: Cyber Attack Lawsuits: How to Avoid the Litigation How Cyber Breach Litigation Works W…
…
continue reading

1
Protecting Identities - Best Practices and Fraud Prevention
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview 02:49 Shining a Light on the Victim's Perspective 10:00 Creating a Seamless User Experience 12:23 The Role of Behavioral Biometrics in Fraud Detection 15:16 Distinguishing Between Legitimate Users and Cyber Criminals 20:06 The E…
…
continue reading

1
Hacking Big Tech. Bryan Seely Interview.
1:03:37
1:03:37
Play later
Play later
Lists
Like
Liked
1:03:37Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. C…
…
continue reading

1
ARM YOURSELF Against Cyber Crime in 2025 🔥New Playlists Revealed!🔥
1:50
1:50
Play later
Play later
Lists
Like
Liked
1:50Welcome to Cyber Crime Junkies—where cybersecurity finally meets binge-worthy storytelling. Join Our Community. Choose a PLAYLIST! Protect your personal data and online identity from cyber threats with this comprehensive guide to cybersecurity 101! In today's digital age, it's crucial to prioritize internet safety and secure browsing habits to avoi…
…
continue reading

1
New Ways to Take Control Over Data Privacy with Kurt Long.
56:23
56:23
Play later
Play later
Lists
Like
Liked
56:23Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work a…
…
continue reading

1
EMERGING new RANSOMWARE Gangs. Expert John Hammond.
24:01
24:01
Play later
Play later
Lists
Like
Liked
24:01Legendary Expert John Hammond. Exclusive. Learning How To Hack And Turn It Into A Career with topics: Newest security expert insight, best cybersecurity practices for business, how capture the flag exercises help, and How To Protect Security Of Organizations With Artificial Intelligence. Huntress: https://www.huntress.com/ Send us a text Growth wit…
…
continue reading

1
How To Bring Social Responsibility To Crypto
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30Tavi Gallego, founder of a new crypto exchange:the Global Investment Crypto Exchange based here in US Midwest joins us. We discuss how to bring social responsibility to crypto. Don't Miss The Video Episode here: https://youtu.be/0xxn7jAdSRw Topics: non profit approaches to crypto currency, benefits of charity through crypto currency, charity throug…
…
continue reading

1
Shadow AI & Ransomware--Agentic AI EXPOSED
1:00:57
1:00:57
Play later
Play later
Lists
Like
Liked
1:00:57New Episode! Tell us your feedback! Is Your Company Safe From AI Attacks? This episode covers the intersection of artificial intelligence and cybersecurity, exploring how AI can be used for both protection and malicious purposes. We examine how AI is used to create advanced ai cybercrime and deep fakes, and the rising threat of social engineering a…
…
continue reading
Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World. We discuss: Common misconceptions and Parental Challenges today The Role and Responsibilities Social Media companies have and should have Best Practices and Practical Suggestion to manage the te…
…
continue reading

1
Protecting your Identity and Brand. Expert Panel Discussion.
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55New Episode with Special Guest John McLaughlin. Keeping your brand out of the news from a reputation-damaging data breach is top priority for sound leadership. Keeping criminal hackers out of your private information and stopping them from having unauthorized access to data they have no right to access, often depends on one critical factor: identif…
…
continue reading

1
Biggest Cyber Insurance Mistakes To Avoid
58:02
58:02
Play later
Play later
Lists
Like
Liked
58:02Joined by Joseph Brunsman discussing how to avoid cyber insurance mistakes, biggest cyber insurance mistakes to avoid, and how to transfer risk for SMBs. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Sp…
…
continue reading
This conversation explores the rapid advancements of AI in healthcare, emphasizing the importance of compliance and the risks associated with shadow AI. It discusses the necessity of prompt training for safe AI usage, the evolving threats of ransomware and social engineering, and the implications of deepfakes in cybersecurity. The conversation conc…
…
continue reading

1
How Self Sovereign Identity Can Protect You Online
1:04:56
1:04:56
Play later
Play later
Lists
Like
Liked
1:04:56Joe Casanova joins us. Joe is the founder and CEO of Furlough, a thriving digital ecosystem of more than 20k entrepreneurs, brand owners, marketers, and digital pros that fosters career-upskilling and business growth via collaboration. Joe has a decade of experience helping brands to grow and innovate across the e-commerce, influencer, tech, and be…
…
continue reading

1
How the FBI fights Cyber Crime. Four Truths.
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42Ever wondered what really happens in a cyber crime manhunt and take-down? What the FBI actually does in cybersecurity? How they help the publc? Today we got the rare chance to sit down with Special Agent with the FBI’s Cyber Crime Division (RET.), Scott Augenbaum. He shares practical ways how to protect yourself online. His model called the Four (4…
…
continue reading

1
AI Risks EXPOSED--How Hackers Use AI Today
1:05:02
1:05:02
Play later
Play later
Lists
Like
Liked
1:05:02Don't let your small business fall victim to devastating cyber attacks! Expert joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a text Growth without Interruption. Get peace of mind…
…
continue reading

1
AI and Your Privacy. Digital Citizenship Today.
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31This is the story of AI and Your Privacy. Digital Citizenship Today. Antoinette King, Author of the book Digital Citizens Guide to Cybersecurity. She is the founder of Credo Cyber Consulting, LLC, who has over 20 years of experience in the security industry, from physical security to digital security. Grab her book: https://www.amazon.com/Digital-C…
…
continue reading

1
🔥Marketing Warfare: How A New Framework is IGNITING Small Business Growth
54:42
54:42
Play later
Play later
Lists
Like
Liked
54:42David Mauro and co-host Zach Moskow engage with Kevin McGrew, author of 'The New Rules of Marketing Warfare.' They discuss the intersection of marketing and leadership, emphasizing the importance of frameworks in business strategy. Kevin shares insights on the SMAC framework (Shoot, Move, Adapt, Communicate) and how it can help businesses navigate …
…
continue reading

1
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving …
…
continue reading

1
Crypto Fraud Exposed - How Cyber Crime Turns Violent
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34This is the true cyber crime story of Lamborghini Carjackers Lured by a $243M Cyber heist, a dive into crypto fraud cases and how cyber crime turns violent. This episode explores the dramatic rise and fall of Ray Diaz, a young man entangled in a world of cybercrime, luxury, and violence. It delves into the consequences of doxxing, the ruthless natu…
…
continue reading

1
Higher Education under Cyber Attack. Clemson CISO John Hoyt.
56:47
56:47
Play later
Play later
Lists
Like
Liked
56:47John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss …
…
continue reading
We are joined today by special guest, former FBI special agent Nancy Aguilar, who had worked the Boston Marathon Bombing and other high-profile investigations. She is also the host and creator of Baddass in heels: https://badassinheels.com/ We discuss: FBI Profiling and negotiation, FBI Profiling and counter terrorism, and other key topics: how fbi…
…
continue reading

1
Social Media Crimes EXPOSED🚨Internet Safety
59:22
59:22
Play later
Play later
Lists
Like
Liked
59:22They thought they found love… Instead, they walked straight into a digital slaughterhouse. In this shocking episode of Cyber Crime Junkies, host Dean Mauro and Dr. Sergio Sanchez expose the dark world of pig butchering scams — where victims are “fattened up” with trust before being bled dry financially and emotionally. We reveal: · The $1M “Brad Pi…
…
continue reading