Cyber Crime Junkies
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast
Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
Episodes
293 episodes
Why Cyber Attacks are Not All Equal
Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why...
•
Season 6
•
Episode 26
•
33:00
Unveiling the MOST DANGEROUS AI Risks at Work!
New Episode🔥We explore the importance of proper AI adoption, NIST AI risk management framework and regulatory compliance. Understanding ai governance and having a clear ai policy are crucial for effective ai for business.🔥The Cybercrime Junkies...
•
Season 8
•
Episode 19
•
43:01
Modern Ways to Improve Presentation Skills with Nausheen Chen.
Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:
•
Season 7
•
Episode 9
•
50:55
Baby Al Capone. New Wave of Online Violence Stories.
Shocking True Crime Stories. Baby Al Capone, Swatting & SIM Swaps Mind-blowing episode about Violence-as-a-service, Dark Web forums, Deadly Swatting events and the unbelievable story of a 15 year old affluent suburban child who...
•
Season 7
•
Episode 6
•
52:25
AI's risks to small business EXPOSED. How Attackers Adopt Early 🎯
🔥 New Episode Alert! 🔥A powerful conversation, David Mauro teams up with former Intel Security Executive and experienced CISO, Matthew Rosenquist, to break down the ai risks to small business. Discover AI in social engineering, importanc...
•
Season 6
•
Episode 57
•
1:04:01
Are YOU the Next Victim? STOP Leaving Your Life EXPOSED.
New Episode🔥Guest Dan Elliott (vCISO with RECORDED FUTURE). We emphasize the critical need for robust vendor due diligence and continuous risk assessment to improve automation without compromising security. Understanding artificial intelligence...
•
Season 8
•
Episode 18
•
47:19
FBI Profiling & Negotiation.
We are joined today by special guest, former FBI special agent Nancy Aguilar, who had worked the Boston Marathon Bombing and other high-profile investigations. She is also the host and creator of Baddass in heels:
•
Season 7
•
Episode 11
•
38:04
AI's NOT the Villain | Your Cybersecurity Flaws Are the BIG STARS!
Have you ever noticed how we keep telling ourselves cyber risk is a “future problem” right up until it walks in the front door wearing a name badge?Because in this episode, we’re not talking about Hollywood hackers or hoodie clichés. We’...
•
Season 8
•
Episode 17
•
47:19
Most Wanted Dark Web Hackers. Truth about Scattered Spider.
🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover...
•
Season 7
•
Episode 40
•
46:54
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tort...
•
Season 6
•
Episode 68
•
1:36:01
Higher Education under Cyber Attack. Clemson CISO John Hoyt.
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt e...
•
Season 5
•
Episode 67
•
56:47
Secrets Found In The Dark Web
SummaryThis conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, including passwords and personal informatio...
•
Season 5
•
Episode 13
•
48:43
Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works
Why modern cybercrime targets trust, urgency, and decision-making instead of systemsDeepfake Attacks, Voice Cloning, and Why AI Social Engineering WorksTraditional fraud used to feel obvious: misspellings, odd link...
•
Season 8
•
Episode 15
•
48:46
How Parents Can Protect Children Online.
Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World. We discuss:Common misconceptions and Parental Challe...
•
Season 7
•
Episode 26
•
55:30
What's The FUTURE of QUANTUM?
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of pr...
•
Season 7
•
Episode 52
•
47:54
New Ways to Take Control Over Data Privacy with Kurt Long.
Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage.We discuss new approaches to safe and private messaging apps, how to keep...
•
Season 8
•
Episode 8
•
56:23
Don't Get Tricked. Don't Skip These Two Steps. That's It
Most cybercrime doesn’t start with genius hackers. It starts on a Tuesday. Someone’s busy. An email feels urgent. And a decision gets made five seconds too fast. Fear-based cybersecurity training hasn’t made people safer. It’s made the...
•
Season 8
•
2:18
Protecting Identities - Best Practices and Fraud Prevention
Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamra...
•
Season 7
•
Episode 35
•
53:20
Stop Taking Bad Advice. An Open Letter To The World
We’ve trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates.Cybercrime doesn’t win because it’s smart. It wins because people are tired. We’ve been trained to panic about rare, cinematic ...
•
Season 8
•
2:18
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence A...
•
Season 7
•
Episode 24
•
55:07
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the imp...
•
Season 8
•
Episode 7
•
1:00:43
After the Blast: How One CEO Fought Back 💥 | A True Crime
Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how ...
•
Season 8
•
Episode 8
•
1:19:35
Ransomware Is NOT the Greatest Threat | Here Is What's Coming
New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critic...
•
Season 8
•
Episode 10
•
48:11
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
Catch the Video episode: https://youtu.be/zMNsjSGT-ywAaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos in...
•
Season 8
•
Episode 7
•
50:44