Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading

1
Future of AI in Cybersecurity. A Double-Edge Sword.
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32🚀 AI is transforming cybersecurity! In this episode of Cyber Crime Junkies, host David Mauro interviews Arik Solomon, CEO of Cypago and former CTO of EY’s Cybersecurity Center, to explore the future of Governance, Risk, and Compliance (GRC) in cybersecurity. 🔍 What You’ll Learn: ✅ The role of AI in cybersecurity automation ✅ Why GRC is essential fo…
…
continue reading

1
How Everyone Is Responsible For Cyber Security. Phantom CISO.
1:00:12
1:00:12
Play later
Play later
Lists
Like
Liked
1:00:12Mishaal Khan, Best-selling Author of The Phantom CISO, Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how everyone is responsible for cyber security. https://www.phantomciso.com/ https://www.operationprivacy.com/ Send us a text Gro…
…
continue reading

1
Safeguarding Your Privacy: How to Delete Your Data
59:23
59:23
Play later
Play later
Lists
Like
Liked
59:23David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential risks of AI and deepfake te…
…
continue reading

1
Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.
48:10
48:10
Play later
Play later
Lists
Like
Liked
48:10Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec, an crowd-sourced WAZE-Like Security platform. Learn more here: https://crowdsec.net Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-77…
…
continue reading

1
The Dark Side - New Ways AI is used in Social Engineering.
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today …
…
continue reading
Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail and how to plan accordingly. Summary In this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and…
…
continue reading

1
Ransomware Gang TAKE DOWN: Secrets from the Dark Web.
51:55
51:55
Play later
Play later
Lists
Like
Liked
51:55Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: ransomware explained for small business and ransomware risks for small business, how cyber attacks stay undetected, how intelligence gathering is critical to security, secrets of cybe…
…
continue reading

1
Caught: The Williams Woods Identity Theft Story - A Shocking Twist.
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30The Williams Woods Story. What Happens when Your Identity is Stolen. Video Episode: https://youtu.be/mBU3J-4vKww Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now…
…
continue reading

1
Biggest Data Breach in Modern History. What To Do Now.
49:01
49:01
Play later
Play later
Lists
Like
Liked
49:01The world of cybersecurity has been rocked by a data breach so colossal that it's being called the Biggest Data Breach in Modern History. The National Public Data breach and hacker USDoD are discussed in a true cyber crime story. The biggest data breach in modern history, involving National Public Data and its sister site Records Check. The breach …
…
continue reading
Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other …
…
continue reading

1
Inside The Truth About Why TikTok Got Banned in US.
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49The US has signed into new law the Ban of Tik Tok which took effect today and now is on hold pending a sale in the next 90-days. What does this mean? Covering: latest news on tik tok ban, latest on tik tok ban, latest tik tok ban, latest tik tok ban news in us, TikTok ban in US latest news, TikTok ban in USA latest news, TikTok banned in us, TikTok…
…
continue reading

1
Cybercrime vs Small Business. Insider View of Cyber Crime.
49:18
49:18
Play later
Play later
Lists
Like
Liked
49:18Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber …
…
continue reading

1
When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59Cyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, c…
…
continue reading
🚨 NEW EPISODE ALERT! 🚨 🔒 Are you prepared for the risks of AI-powered deception? Got AI? What to watch for in Fake Videos and Social Engineering. 🤖 Are you ready to confront the dark side of AI? 🤖 Unmasking AI Deepfakes & Cyber Threats. Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! F…
…
continue reading

1
The Aftermath. Navigating Reputations and Protecting Your Brand Image
50:20
50:20
Play later
Play later
Lists
Like
Liked
50:20James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics dis…
…
continue reading

1
How To Avoid Business Interruption. What Leaders Must do.
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Interview of Host David Mauro on topics of How To Avoid Business Interruption. What Leaders Must do. Covering true healthcare breaches which have killed and effected medical care along with small business guidance. Topics include: how to avoid business interruption, what business leaders need to know about cyber attacks, when ransomware kills, how …
…
continue reading

1
Hacking Big Tech. Bryan Seely Interview.
1:04:18
1:04:18
Play later
Play later
Lists
Like
Liked
1:04:18Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. C…
…
continue reading

1
From Forbes Cover to Federal Indictment-- The Charlie Javice Fraud Scandal Unveiled
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46We explore the breaking scandal that is set for trial this Winter. Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us ou…
…
continue reading

1
'Got Junk' Founder. Exclusive. Understanding Business Culture.
47:07
47:07
Play later
Play later
Lists
Like
Liked
47:07Brian Scumadmore, founder and serial entrepreneur, known for pioneering the professional junk hauling industry with 1-800-GOT-JUNK tells a riveting story of how he founded the organization and grew it across several countries. A familiar guest on Oprah and other Dont Miss the Video Episode!: https://youtu.be/cd34lHwSBi4 Topics: culture driving scal…
…
continue reading

1
CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson.
51:16
51:16
Play later
Play later
Lists
Like
Liked
51:16🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to co…
…
continue reading

1
Building a Cybersecurity Mindset: AI, Culture, & Governance Explained
43:44
43:44
Play later
Play later
Lists
Like
Liked
43:44David Mauro and DeWayne Hart explore the critical aspects of building a cyber security mindset, understanding cyber security awareness, internet governance in cyber security, and importance of culture in cybersecurity. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844…
…
continue reading

1
Emerging Tech Changed Everything. Food. Medicine. Crime.
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04This conversation delves into Emerging Tech Changed Everything. Food. Medicine. Crime. Covering the alarming rise of ransomware attacks, their impact on businesses and healthcare, and the evolving landscape of cybercrime. It highlights the staggering financial costs, the organized nature of cybercriminal operations, and the legal implications for c…
…
continue reading

1
Unlocking Unity: The Power of Civil Discourse and Protecting Online Privacy in America
1:00:29
1:00:29
Play later
Play later
Lists
Like
Liked
1:00:29Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over Data Privacy, and why protecting online privacy is important. Summary The conversation explores the topics of data privacy, government surveillance, and unde…
…
continue reading

1
Mind Games: Exploring Brain Reactions in Social Engineering
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Send us a text Grow without…
…
continue reading

1
Evolution of the Hacker Mindset. Lessons from 2011 SONY Breach and Beyond
55:48
55:48
Play later
Play later
Lists
Like
Liked
55:48Join us as Cody Kretsinger shares his journey from the blind arrogance of youth and dark side of hacking to his evolution into the brilliant, community thought leader and leading-edge cybersecurity provider. It’s a unique perspective on protecting against cybercrime and understanding Modus operandi. Chapters 00:00 Introduction to Cybercrime and Hac…
…
continue reading