1. EachPod

Cyber Crime Junkies - Podcast

Cyber Crime Junkies

Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.

Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

Management Business Leadership Society & Culture Stories True Crime
Update frequency
every day
Average duration
44 minutes
Episodes
282
Years Active
2022 - 2025
Share to:
Best ways to keep up to date on security news. Latest Cyber Crimes.

Best ways to keep up to date on security news. Latest Cyber Crimes.

 Best ways to keep up to date on security news. Latest Cyber Crimes.  So many cybercrimes and so little time. Every week we get inundated with news affects our personal and professional lives.  

How d…

00:44:14  |   Tue 18 Mar 2025
AI's risks to small business EXPOSED. How Attackers Adopt Early 🎯

AI's risks to small business EXPOSED. How Attackers Adopt Early 🎯

🔥 New Episode Alert! 🔥

A powerful conversation, David Mauro teams up with former Intel Security Executive and experienced CISO, Matthew Rosenquist, to break down the ai risks to small business. Discov…

01:04:01  |   Sun 16 Mar 2025
Rise And Fall of Crypto Star. FBI most wanted, Ruja Ignatova. Crypto News.

Rise And Fall of Crypto Star. FBI most wanted, Ruja Ignatova. Crypto News.


Crypto News, Cyber flash point about self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova. 

To Submit a TIP and Potentially collect the new $5 Million R…

00:38:22  |   Sat 15 Mar 2025
AI Exposed. Latest Social Engineering Business Cyber Risk.

AI Exposed. Latest Social Engineering Business Cyber Risk.

Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the impor…

01:09:23  |   Thu 13 Mar 2025
Innovative Ways to Reduce Website Spoofing

Innovative Ways to Reduce Website Spoofing

After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the n…

00:58:44  |   Sat 08 Mar 2025
Unmasking Invisible Threats: Quantifying Cyber Security

Unmasking Invisible Threats: Quantifying Cyber Security

Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. 

David Mauro inte…

01:03:30  |   Fri 07 Mar 2025
Is Ransomware Dead? What Cyber Criminals Are Saying.

Is Ransomware Dead? What Cyber Criminals Are Saying.

Is Ransomware Dead? 

 Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss:
 

  • how cyber crime i…
00:34:02  |   Thu 06 Mar 2025
Phone Rings. It's A Social Engineer Callling.

Phone Rings. It's A Social Engineer Callling.

Video Episode: https://youtu.be/oH7FpvHOhVA

This is the story of Matt Smallman, author of “Unlocking Your Call Centre”, about how call centers can be security risks. Our discussion gives exclusive in…

00:57:35  |   Sat 01 Mar 2025
War Games. In Business.

War Games. In Business.

This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business.

Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging wa…

00:45:21  |   Fri 28 Feb 2025
Quantum AI: What You Need to Know NOW!

Quantum AI: What You Need to Know NOW!

Quantum AI: What You Need to Know NOW! 🚨🔐 Quantum computing is revolutionizing cybersecurity—are we ready? In this Cyber Crime Junkies episode, we uncover how quantum tech could break encryption, thr…

00:31:35  |   Fri 28 Feb 2025
New Ways Leaders Can Assess Their Risk Appetite

New Ways Leaders Can Assess Their Risk Appetite

In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.

KEY TOPICS: 

  • ·      how risk appetite effects your cyber se…
00:52:41  |   Wed 26 Feb 2025
Secrets Revealed--How To Grow Business Not Get Hacked🔥

Secrets Revealed--How To Grow Business Not Get Hacked🔥

🚨 New episode 🚨 host David Mauro engages with technology and security leaders to explore the critical roles of Network Operations Centers (NOC) and Security Operations Centers (SOC) in modern busines…

00:38:05  |   Wed 19 Feb 2025
Most Wanted Dark Web Hackers. Truth about Scattered Spider.

Most Wanted Dark Web Hackers. Truth about Scattered Spider.

🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted…

00:46:54  |   Sat 15 Feb 2025
When Gamers Start Swatting: Violence for Hire Online

When Gamers Start Swatting: Violence for Hire Online

We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online.

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today …

00:52:19  |   Wed 12 Feb 2025
Future of AI in Cybersecurity. A Double-Edge Sword.

Future of AI in Cybersecurity. A Double-Edge Sword.

🚀 AI is transforming cybersecurity! In this episode of Cyber Crime Junkies, host David Mauro interviews Arik Solomon, CEO of Cypago and former CTO of EY’s Cybersecurity Center, to explore the future …

00:29:31  |   Sun 09 Feb 2025
Safeguarding Your Privacy: How to Delete Your Data

Safeguarding Your Privacy: How to Delete Your Data

David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of priva…

00:58:42  |   Fri 07 Feb 2025
Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.

Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.

Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec, an crowd-sourced WAZE-Like Security platform. 

Learn more here: http…

00:47:29  |   Sun 02 Feb 2025
The Dark Side - New Ways AI is used in Social Engineering.

The Dark Side - New Ways AI is used in Social Engineering.

Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to r…

00:34:36  |   Fri 31 Jan 2025
No Exit-When Data Back Ups Fail

No Exit-When Data Back Ups Fail

Gabe Gambill, international technology expert with  Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail  and how to plan accordingly. 

Summary

In th…

00:55:53  |   Wed 29 Jan 2025
Ransomware Gang TAKE DOWN: Secrets from the Dark Web.

Ransomware Gang TAKE DOWN: Secrets from the Dark Web.

Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: 

  • ransomware explained for small b…
00:51:14  |   Tue 28 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Cyber Crime Junkies. Host David Mauro.. This content is not affiliated with or endorsed by eachpod.com.