Cyber Crime Junkies-logo

Cyber Crime Junkies

True Crime

Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

Location:

United States

Description:

Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

Language:

English

Contact:

(317) 682-9325


Episodes
Ask host to enable sharing for playback control

Are you at Risk? Personal Liability Cyber Breaches.

4/28/2025
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives. The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of cyber insurance and the potential risks and liabilities that businesses face in the event of a cyber breach. They emphasize the need for businesses to proactively plan and implement cybersecurity measures to mitigate these risks. They also highlight the changing landscape of cyber insurance policies and the need for businesses to stay informed about exclusions and coverage limitations. The conversation concludes with the reminder that businesses should consult with subject matter experts and develop a comprehensive cybersecurity roadmap. Chapters Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:54:33

Ask host to enable sharing for playback control

🚨New FBI Alert🚨Got a DM from the β€œFBI” on Telegram?

4/27/2025
πŸ“² Got a DM from the β€œFBI” on Telegram? 🚨 Did someone named β€œJaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as β€œJaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint Center (IC3) β€” and reaching out to individuals claiming they’ve been hacked or need help. 🚫 It’s a fraudulent scheme designed to gain your trust… and steal your info or money. πŸ” Remember: βœ… The FBI does NOT initiate contact through social apps βœ… IC3 communications never happen via Telegram βœ… Always verify claims through official .gov websites Don’t get duped by a fake badge. Stay informed. Stay protected. πŸ›‘οΈ #FBIAlert #CyberSecurity #TelegramScam #IC3Fraud #CyberAwareness #SocialEngineering #Phishing #CyberCrimeJunkies #OnlineSafety #ScamAlert Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:01:47

Ask host to enable sharing for playback control

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure

4/27/2025
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:01:36:41

Ask host to enable sharing for playback control

New Alert 🚨 Beware of Your Next Google Search🚨

4/26/2025
πŸ‘€ Could your next Google search lead you into a cyber trap? πŸ” Are you sure that β€œHR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE β€” yes, even you β€” that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy search engine ads that look legit ⚠️ The ad directs you to a fake login page ⚠️ You enter your info... and they steal it πŸ”Ž They’re after YOUR login, YOUR paycheck, and YOUR personal financial data. πŸ›‘οΈ What to do: βœ… Never click login links from search ads βœ… Always navigate directly to known URLs βœ… Use multi-factor authentication on everything Stay sharp. Stay secure. This isn’t just IT’s job β€” it’s everyone’s job now. #CyberSecurity #FBIWarning #OnlineSafety #CyberCrime #Phishing #Infosec #CyberAlert #DigitalSecurity #EmployeeSelfService #CyberCrimeJunkies Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:01:55

Ask host to enable sharing for playback control

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨

4/25/2025
πŸ“¬ Would you fall for a fake Google subpoena? πŸ›‘οΈ What if it passed every security check β€” and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses β€” and it’s terrifyingly convincing. πŸ•΅οΈβ€β™‚οΈ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. βœ… No misspellings βœ… No suspicious links βœ… No obvious red flags They’re polished. They pass filters. And they’re designed to fool even the cautious. πŸ“Œ These emails aren’t just phishing β€” they’re weaponized impersonation. πŸ” How to protect yourself: independentlyThe phishing game has leveled up. So must your awareness. πŸ‘οΈβ€πŸ—¨οΈ #CyberSecurity #PhishingAlert #GoogleSubpoenaScam #SecurityAwareness #ImpersonationAttack #CyberCrime #CyberDefense #DigitalSafety #CyberCrimeJunkies Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:01:39

Ask host to enable sharing for playback control

Zero Trust, SMB & National Security. INTEL CTO Exclusive.

4/25/2025
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities. Key topics: latest cyber security concerns, Global Cyber Security Strategy, zero trust small business and national security, zero trust and national security, zero trust in critical infrastructure, zero trust in supply chain, zero trust in small business, secrets inside zero trust, how us cyber security strategy effects allies, driving change in cyber security today, zero trust in cyber security today For more: CyberCrimeJunkies Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:01:01:40

Ask host to enable sharing for playback control

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.

4/24/2025
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:58:15

Ask host to enable sharing for playback control

How start a career in cybersecurity today. Josh Mason

4/21/2025
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today, effective communication for security internally in business, new approaches to enter the cybersecurity field, and best ways to keep up to date on security news. Also discussed cybersecurity careers for military, military to cybersecurity careers, ways to transition from military into cybersecurity, how to transition from military into cybersecurity today. Connect with Josh: https://www.linkedin.com/in/joshuacmason/ Here's Policy Wizard training we mentioned: https://www.policywizard.io/ VIDEO Episode Link: πŸ‘©β€πŸ’» https://youtu.be/uVMcnl-PNT4 πŸ”” Want πŸ’Ž EXCLUSIVEπŸ’Ž Content? For only $4 πŸ’Ž SUBSCRIBE to Cyber Crime Junkies PRIME https://www.buzzsprout.com/2014652/supporters/new /LETS CONNECT/ We Really want people to be able to Watch and Listen and we would love your help. πŸ“² πŸ“² PLEASE CONSIDER SUBSCRIBING to our Youtube Channel. It's FREE and it will help us to help others. πŸ“² πŸ“² Our Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg Our /SOCIALS and PODCAST/ πŸ“² DAVID MAURO Linkedin: https://www.linkedin.com/in/daviddmauro/ πŸ“² Cyber Crime Junkies Linkedin: https://www.linkedin.com/in/cybercrimejunkies/ πŸ”” Site, Research Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:56:21

Ask host to enable sharing for playback control

Zero Trust. Social Engineering. Ron Woerner.

4/20/2025
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec (https://veteransec.org/), a non-profit that helps military build their cybersecurity careers. We cover key topics: New approaches to understanding zero trust, New Approaches to understanding social engineering, best cybersecurity practices for business, best policies to limit cyber liability, best practices identity protection, business benefits for having security assessments done, educating on security by podcasting, how intelligence gathering is critical to security, how to communicate effectively internally in business, impact the new us security strategy have on ai, innovative ways for security education, latest security expert insight, lowering risk of a data breach by security awareness training, new approaches to security awareness, new ways to limit cyber liability, newest ways to protect your identity online today, social engineering the science behind it, top security tips we all want to know, understanding the hacker mindset, understanding the neuroscience of social engineering, ways to stop social engineering. Audio Podcast: Available Everywhere. Thanks for Listening and Watching. PLEASE CONSIDER SUBSCRIBING. It's FREE and it will help us to help others. Our Video Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:44:18

Ask host to enable sharing for playback control

Oracle Breach 2025 🎯 How Hackers Attack

4/19/2025
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents highlighted critical vulnerabilities in Oracle's infrastructure and the importance of timely detection and response. The aftermath included a class action lawsuit and ongoing investigations, emphasizing the need for robust cybersecurity measures and transparency in handling breaches. Catch the Video: https://youtu.be/YWAmzPmG0YM Takeaways β€’ Oracle was breached twice in early 2025, raising alarms. β€’ The first breach compromised healthcare data via outdated servers. β€’ The second breach involved an inactive legacy system. β€’ Hackers exploited known vulnerabilities to gain access. β€’ Delayed detection allowed unauthorized access for weeks. β€’ Oracle's response included denying the breaches initially. β€’ A class action lawsuit was filed against Oracle for negligence. β€’ Legacy systems pose significant security risks if not decommissioned. β€’ Timely detection and monitoring are crucial for cybersecurity. β€’ Organizations must prioritize patch management and system updates. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:35:53

Ask host to enable sharing for playback control

Hunting Down Hackers. John Hammond Exclusive.

4/17/2025
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cyber crime gangs including EXCLUSIVE DISCUSSION ON BLACK CAT RANSOMWARE GANG and Anatomy of a Social Engineering attack. Topics: understanding cyber crime mind, new insight on true cyber crime examples, new insight on cyber crime gangs, best ways to keep up to date on security news, best ways to limit cyber attack liability, best ways to protect business from cyber crime, and brand protection with identification authentication. John has a huge following: 2 Million Youtube subscribers, 570k+ Twitter followers and 250k+ Linkedin Followers! Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:01:00:59

Ask host to enable sharing for playback control

πŸ”₯ How Hackers Can Protect Your Business | AI Risks & DEF CON SecretsπŸ”₯

4/15/2025
What if the hackers are actually the heroes? In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threats. πŸŽ–οΈ From serving in the U.S. Air Force as a Senior Cyber Tactics Lead, to becoming a NetWars Champion and SANS instructor, Matt shares battle-tested insights and introduces Sirius β€” the groundbreaking open-source vulnerability scanner that’s changing the game. 🚨 Whether you run a business or just want to finally get serious about cybersecurity, this episode is PACKED with unfiltered truth, practical strategies, and behind-the-scenes access to the front lines of cyber warfare. Takeaways β€’ Matt Toussaint's journey from military to cybersecurity is inspiring. β€’ DEF CON is a great platform for new voices in cybersecurity. β€’ Penetration testing is crucial for identifying vulnerabilities. β€’ Real-world examples highlight the importance of cybersecurity. β€’ Sirius is an open-source vulnerability scanning tool. β€’ Organizations often overlook basic security practices like password management. β€’ The Colonial Pipeline incident serves as a cautionary tale. β€’ Effective remediation is key after penetration testing. β€’ Cybersecurity is a constantly evolving field. β€’ Networking at events like DEF CON can lead to valuable connections. Password management is a significant challenge for organizations. β€’ MSPs often lack the resources to provide adequate security. β€’ Outsourcing IT can lead to increased tech debt and security risks. β€’ Incident response requires a deep understanding of the threat landscape. β€’ Nation-state actors pose unique challenges in cybersecurity. β€’ Prosecution of cybercriminals is complicated by international law. β€’ Geopo Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:58:42

Ask host to enable sharing for playback control

Mind Games: Exploring Brain Reactions in Social Engineering

4/15/2025
We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:52:29

Ask host to enable sharing for playback control

CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson.

4/15/2025
🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to commit cyber crimes. A must-watch for anyone interested in cybersecurity, the criminal mindset, and the transformative journey from crime to redemption. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:51:15

Ask host to enable sharing for playback control

Hacking Humans Using Science

4/11/2025
Chris Hadnagy, Best-selling author, security expert and CEO of Social Engineer, LLC, join sus to discuss hacking humans using sacience. Topics: understanding science in social engineering, hacking humans using science, neuroscience behind social engineering, science supporting social engineering, psychology of social engineering explained, how neuroscience hacks humans, the science behind hacking humans, Come join us this year as we celebrate the 20th anniversary of the importance of cybersecurity awareness month Subscribe to our YouTube Channel for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg For more real cybercrime stories, visit our website at https://cybercrimejunkies.com. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:57:08

Ask host to enable sharing for playback control

The Undetected. Espionage and Spies.(Part 2)

4/8/2025
Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on US Businesses and Innovation Inside Espionage: What Every American Should Know Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:30:23

Ask host to enable sharing for playback control

The Undetected. Espionage and Spies.(Part 1)

4/7/2025
There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:31:08

Ask host to enable sharing for playback control

PowerSchool Exposed-πŸ”₯-Children at Risk at School

4/5/2025
🚨New Episode 🚨We dive into PowerSchool Exposed-- Children at Risk at School, about the significant cybersecurity breach at PowerSchool, which exposed sensitive data of millions of students and teachers. It emphasizes the importance of transparency, accountability, and robust cybersecurity measures in protecting sensitive information. Takeaways Chapters Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:28:48

Ask host to enable sharing for playback control

The Shocking Rise and Fall of 23andMe. Exposed.

4/4/2025
We expose and discuss the rise and fall of genetic testing company 23andMe. On September 13th, 2024 the once popular genetic testing company β€œ23andMe” agreed to a $30 million settlement stemming from a data breach that affected nearly 7 million users. The next day, on September 14th every single board member resigned. Victims of the data breach are at risk of being targeted. This is their story. We include a segment from Michelle Aquinas with Menlo Labs. Follow her at https://www.youtube.com/@michellethevc Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:26:31

Ask host to enable sharing for playback control

Start-Up Fraud Stories. How They Caught Elizabeth Holmes.

4/3/2025
This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict. The technology never worked as promised. Was her intent to hope that the tech would β€œcatch up” to what they had promised investors and regulators? Or had Theranos and Elizabeth Holmes crossed the line of NO return when they unleashed their tech through clinics treating patients with incorrect and wildly inaccurate test results? You can decide for yourself after hearing what unfolds. Takeaways Chapters Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: πŸ”— Website: https://cybercrimejunkies.com πŸ“± X/Twitter: https://x.com/CybercrimeJunky πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 πŸŽ™οΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Duration:00:52:05