Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading

1
What Makes A GREAT Leader Today? Secret Communication Skills Revealed.
58:41
58:41
Play later
Play later
Lists
Like
Liked
58:41In today's fast-paced and ever-changing world, leadership is more crucial than ever. But what makes a GREAT leader in this new era? Is it their ability to adapt to change, their capacity to inspire and motivate their team, or their willingness to take calculated risks? We'll explore the key characteristics and qualities that define a GREAT leader i…
…
continue reading

1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zo…
…
continue reading
Jospeh Hudson, Director of Growth at TCM Security join sus in the studio. An experienced recruiter, former teacher, involved parent and thought-leader in the cyber security space Joe shares insight into how to avoid land minds in job searching. Topics: landminds in job searching, land minds in job searching, job searching in security, job searching…
…
continue reading

1
Insider Secrets--Top 5 Human Resource Strategy and Leadership Skills
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Host Dean Mauro interviews Amy Cappellanti-Wolf, CHRO with Dayforce, an experienced Chief Human Resources Officer, discussing the importance of AI in HR, HR Technology, Human Resource Strategy and Leadership Skills. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or …
…
continue reading

1
Baby Al Capone. New Wave of Online Violence Stories.
52:25
52:25
Play later
Play later
Lists
Like
Liked
52:25Shocking True Crime Stories. Baby Al Capone, Swatting & SIM Swaps Mind-blowing episode about Violence-as-a-service, Dark Web forums, Deadly Swatting events and the unbelievable story of a 15 year old affluent suburban child who became legendary as Baby Al Capone. Our mission is to keep you, your family and your organization's brand safe. Nothing te…
…
continue reading

1
ARM YOURSELF Against Cyber Crime in 2025 🔥New Playlists Revealed!🔥
1:50
1:50
Play later
Play later
Lists
Like
Liked
1:50Welcome to Cyber Crime Junkies—where cybersecurity finally meets binge-worthy storytelling. Join Our Community. Choose a PLAYLIST! Protect your personal data and online identity from cyber threats with this comprehensive guide to cybersecurity 101! In today's digital age, it's crucial to prioritize internet safety and secure browsing habits to avoi…
…
continue reading

1
Ransomware Real Life Stories Effect On People. PART 2
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling em…
…
continue reading

1
Ransomware Real Life Stories Effect On People. PART 1
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling em…
…
continue reading

1
Famous Hacker Reveals! True Ethical Hacking Stories.
49:03
49:03
Play later
Play later
Lists
Like
Liked
49:03🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping…
…
continue reading

1
FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
…
continue reading

1
🔥 Leadership Secrets REVEALED 🔥 AI in Health Sector
54:14
54:14
Play later
Play later
Lists
Like
Liked
54:14🔥 Leadership Secrets REVEALED 🔥 AI in Health Sector. Unlock the secrets of to overcoming Healthcare IT's most pressing challenges! In this video, we'll dive into the leadership strategies and best practices that top healthcare organizations use to navigate the industry's biggest dilemmas. Dean Mauro and healthcare IT Director, and Sheriff deputy, S…
…
continue reading
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
…
continue reading

1
Death in Crypto Land. Ultimate Exit Scam.
45:42
45:42
Play later
Play later
Lists
Like
Liked
45:42This is the story of a notorious death in cryptoland. Many say it’s the ultimate exist scam. Gerald Cotten, the founder of QuadrigaCX, died in 2018 under mysterious circumstances, leading to the loss of $215 million in cryptocurrency. Despite claims that he passed away due to what is medically considered non-fatal Crohn’s disease while in India, ma…
…
continue reading
From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what the…
…
continue reading
Summary This conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, including passwords and personal information. The conversation also delves into the operations of cybercrime gangs and their recruitment of cyber mercenari…
…
continue reading

1
Who Do Hackers Target The Most? Real Truth About Cyber Crime. FBI vs Cyber Crime.
30:09
30:09
Play later
Play later
Lists
Like
Liked
30:09In this episode of Cyber Crime Junkies, host Dean Mauro explores listener question of who do hackers target the most. He explains the real truth about cyber crime, recent examples of Cyber crime This year, Small business cyber attacks, and he evaluates FBI IC3 Report 2025 Send us a text Growth without Interruption. Get peace of mind. Stay Competiti…
…
continue reading

1
You Can Stop Breaches. Exclusive CISO Insight.
57:57
57:57
Play later
Play later
Lists
Like
Liked
57:57Joining us is Matthew Rosenquist, a massively followed thought leader and Top Voice. A renowned CISO, Cybersecurity leader and strategist, we discuss the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks. Send us a text Growth without Interruption. Get pea…
…
continue reading

1
AI Is Attacking Healthcare—Social Engineering EXPOSED. (Dr Sergio Sanchez)
1:02:30
1:02:30
Play later
Play later
Lists
Like
Liked
1:02:30Dr. Sergio Sanchez—former leader and advisor at Apple, The Vatican, Activision and medical doctor—exposes how cybercriminals are using AI in healthcare and AI Social Engineering to clone voices, fake identities, and empty your savings without a trace. But that’s just the beginning… In this mind-blowing episode, we dive into: · The dark side of AI (…
…
continue reading

1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:26:43
1:26:43
Play later
Play later
Lists
Like
Liked
1:26:43If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “worst phishing attempt” below—I’ll…
…
continue reading

1
Building a Cybersecurity Mindset: AI, Culture, & Governance Explained
43:02
43:02
Play later
Play later
Lists
Like
Liked
43:02David Mauro and DeWayne Hart explore the critical aspects of building a cyber security mindset, understanding cyber security awareness, internet governance in cyber security, and importance of culture in cybersecurity. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 …
…
continue reading
Scott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the…
…
continue reading

1
Emotional Firewalls: Mastering EQ to Outsmart Global Cyber Threats
43:29
43:29
Play later
Play later
Lists
Like
Liked
43:29Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI. We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how internation…
…
continue reading
Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other …
…
continue reading

1
Can you Spot AI Job Applicant Fraud? Think again!
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24On this Cyber Crime Junkies deep-dive, we expose how deepfake job applicants, AI-powered resumes, and AI voice-cloning are turning remote hiring into the ultimate con. Real-world cases include executives duped by glitchy interview bots—and one bizarre scam channeling funds to international criminals. 👨💻 What you’ll discover: · AI resume generators…
…
continue reading

1
Cyber Security Differences Between US Versus UK
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Richard Hollis of Risk Crew (https://www.riskcrew.com) in London joins Cyber Crime Junkies studio (https://cybercrimejunkies.com) for exclusive discussion on: cyber security differences between US versus UK, how cybersecurity efforts usually fail and Difference between customers or enemies. Don't miss the video episode: https://youtu.be/5jjlJx_EyXI…
…
continue reading