Cyber Crime Junkies

10 Episodes
Subscribe

By: Cyber Crime Junkies. Host David Mauro.

Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business
#80
Today at 2:00 AM

Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power to protect your business?

In this exclusive interview, we sit down with Chris Roberts, world-renowned cybersecurity expert, CISO and self-defined “Hacker” to explore:

🤖 How Hackers Think — and why it matters more than ever🧠 New AI...


Are you at Risk? Personal Liability Cyber Breaches.
#64
Last Monday at 4:00 AM

We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives. 

The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of c...


🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram?
Last Sunday at 4:00 PM

📲 Got a DM from the “FBI” on Telegram?
🚨 Did someone named “Jaimie Quin” claim they run IC3?

⚠️ It’s a scam. Full stop.

The FBI just issued an alert warning the public:
They are NOT direct messaging victims on Telegram or any other social media app.

A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint Center (IC3) — and reaching out to individuals claiming they’ve been hacked or need help.

🚫 It’s a <...


Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
#68
Last Sunday at 4:00 AM

Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home

Chapters

00:00 Introduction to the Challenges of Securing Critical Infrastructure03:11 Vulnerabilities and Weaknesses in Critical Infrastructure10:03 Challenges Faced by Small to Mid-Sized Critical Infrastructure Organizations17:05 The Impact of Ransomware Attacks on Critical Infrastructure27:25 The Role of Artificial Intelligence in Cyber Warfare36:15 The Interplay Between State Actors and Criminal Organizations43:34 The Challenges of Attribution and CTI Sharing44:45 The Power of AI...


New Alert 🚨 Beware of Your Next Google Search🚨
Last Saturday at 11:00 PM

👀 Could your next Google search lead you into a cyber trap?
🔐 Are you sure that “HR login” link isn’t a fake?

🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals).

Here’s how it works:
 ⚠️ Fraudsters buy search engine ads that look legit
⚠️ The ad directs you to a fake login page
⚠️ You enter your info... and they steal it

🔎 They’re after YOUR login, YOUR paycheck, and YO...


New Alert. 🚨 Don't Fall For The New Google Subpoena🚨
Last Friday at 11:00 PM

📬 Would you fall for a fake Google subpoena?
🛡️ What if it passed every security check — and looked 100% real?

🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing.

🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google.
✅ No misspellings
✅ No suspicious links
✅ No obvious red flags

They’re polished.
They pass filters.
And they’re designed to fool even the cautious.

📌 These emails aren’t just phishing — they’re weaponized impersonat...


Zero Trust, SMB & National Security. INTEL CTO Exclusive.
#62
Last Friday at 4:00 AM

Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o

Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities.

Key topics: latest cyber security concerns, Global Cyber Security Strategy, zero trust small business and national security, zero trust and national security, zero trust i...


Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
#75
04/24/2025

David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know.

Chapters

00:00 The Reality of Cybercrime02:00 Introduction to Ransomware Negotiation03:04 The Journey into Cybersecurity06:13 Understanding Ransomware Attacks09:00 The Art of Negotiation with Threat Actors11:53 Case Studies in Ransomware Negotiation16:00 The Role of Cyber Insurance18:49 Incident Response Planning21:57 How To Deal With Online Extortion25:09 The Business of Ransomware30:04 Secrets To Cyber...


How start a career in cybersecurity today. Josh Mason
#63
04/21/2025

Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today, effective communication for security internally in business, new approaches to enter the cybersecurity field, and best ways to keep up to date on security news. Also discussed cybersecurity careers for military, military to cybersecurity careers, ways to transition from military into cybersecurity, how to transition from military into cybersecurity...


Zero Trust. Social Engineering. Ron Woerner.
#67
04/20/2025

Zero Trust. New Approaches to Social Engineering.

Video Episode:  https://youtu.be/U-RiapHidco

 We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec (https://veteransec.org/), a non-profit that helps military build their cybersecurity careers. 

We cover key topics:

New approaches to understanding zero trust, New Approaches to understanding social engineering, b...