Artwork

Player FM - Internet Radio Done Right
Checked 12h ago
Added one year ago
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
icon Daily Deals

Mind Games: Exploring Brain Reactions in Social Engineering

52:29
 
Share
 

Manage episode 457978195 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing.

Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

251 episodes

Artwork
iconShare
 
Manage episode 457978195 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing.

Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

251 episodes

All episodes

×
 
Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter , former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses identity verification challenges. We discuss how to reduce risk from multi factor authentication, explore mobile-based identity verification as well as how cryptography reduces cyber risk. This episode is a guide for how to reduce risk from multi factor authentication. See what Aaron’s new company NAMETAG can do for your company’s security at https://getnametag.com/ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power to protect your business? In this exclusive interview, we sit down with Chris Roberts , world-renowned cybersecurity expert, CISO and self-defined “Hacker” to explore: 🤖 How Hackers Think — and why it matters more than ever 🧠 New AI Risks facing small businesses & rural healthcare 🎭 Deepfake Detection and the rise of synthetic threats From AI-powered attacks to defending the digital frontlines , Chris breaks it all down with real stories, hacker secrets, and eye-opening strategies. Discover: 🚨 The difference between hackers and cyber criminals (yes, there’s a BIG difference) 🔒 The newest AI security protections available now 🏥 Practical ways to protect rural healthcare and small orgs Whether you're a business leader, tech enthusiast, or just curious about how the hacker mind works, this conversation will change the way you see digital threats. This one’s eye-opening, practical, and unforgettable. 🎧 Listen. Learn. Protect. 👇 Watch/Listen now and arm yourself with exclusive insight only a world-renowned hacker can provide. #CyberSecurity #AIrisks #HackerMindset #ChrisRoberts #Deepfakes #SmallBusinessSecurity #RuralHealthcare #CyberCrimeJunkies #CyberProtection Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives. The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of cyber insurance and the potential risks and liabilities that businesses face in the event of a cyber breach. They emphasize the need for businesses to proactively plan and implement cybersecurity measures to mitigate these risks. They also highlight the changing landscape of cyber insurance policies and the need for businesses to stay informed about exclusions and coverage limitations. The conversation concludes with the reminder that businesses should consult with subject matter experts and develop a comprehensive cybersecurity roadmap. Chapters 00:00 Introduction to Cybersecurity Insurance 02:18 Changes in the Insurance Industry 06:11 Importance of Accurate Application Process 09:34 Personal Liability for CEOs and Executives 13:54 Regulatory Scrutiny and Enforcement Actions 19:40 Lessons from the SolarWinds Breach 26:54 The Changing Landscape of Cyber Insurance 27:23 Addressing Legacy Hardware and Software Exclusions 35:05 Understanding the Limits of Cyber Insurance Coverage 43:20 Taking Proactive Steps to Mitigate Cyber Risks Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint Center (IC3) — and reaching out to individuals claiming they’ve been hacked or need help. 🚫 It’s a fraudulent scheme designed to gain your trust… and steal your info or money. 🔐 Remember: ✅ The FBI does NOT initiate contact through social apps ✅ IC3 communications never happen via Telegram ✅ Always verify claims through official .gov websites Don’t get duped by a fake badge. Stay informed. Stay protected. 🛡️ #FBIAlert #CyberSecurity #TelegramScam #IC3Fraud #CyberAwareness #SocialEngineering #Phishing #CyberCrimeJunkies #OnlineSafety #ScamAlert Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
Panel discussion with international leaders part of the Silicon Valley Think Tank , Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:03 Challenges Faced by Small to Mid-Sized Critical Infrastructure Organizations 17:05 The Impact of Ransomware Attacks on Critical Infrastructure 27:25 The Role of Artificial Intelligence in Cyber Warfare 36:15 The Interplay Between State Actors and Criminal Organizations 43:34 The Challenges of Attribution and CTI Sharing 44:45 The Power of AI and Threat Intelligence 51:51 The Importance of Public-Private Partnerships 01:00:52 Addressing the Challenges of Entry-Level Positions 01:08:50 Prioritizing Cybersecurity Efforts Based on Risk 01:14:22 The Need for Education and Awareness Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy search engine ads that look legit ⚠️ The ad directs you to a fake login page ⚠️ You enter your info... and they steal it 🔎 They’re after YOUR login, YOUR paycheck, and YOUR personal financial data. 🛡️ What to do: ✅ Never click login links from search ads ✅ Always navigate directly to known URLs ✅ Use multi-factor authentication on everything Stay sharp. Stay secure. This isn’t just IT’s job — it’s everyone’s job now. #CyberSecurity #FBIWarning #OnlineSafety #CyberCrime #Phishing #Infosec #CyberAlert #DigitalSecurity #EmployeeSelfService #CyberCrimeJunkies Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing . 🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google . ✅ No misspellings ✅ No suspicious links ✅ No obvious red flags They’re polished . They pass filters . And they’re designed to fool even the cautious . 📌 These emails aren’t just phishing — they’re weaponized impersonation . 🔐 How to protect yourself: Verify any legal-sounding email with the sender independently Don’t click on attachments or links unless confirmed legitimate Report suspicious emails to your IT/security team immediately The phishing game has leveled up. So must your awareness. 👁️‍🗨️ #CyberSecurity #PhishingAlert #GoogleSubpoenaScam #SecurityAwareness #ImpersonationAttack #CyberCrime #CyberDefense #DigitalSafety #CyberCrimeJunkies Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities. Key topics: latest cyber security concerns, Global Cyber Security Strategy, zero trust small business and national security, zero trust and national security, zero trust in critical infrastructure, zero trust in supply chain, zero trust in small business, secrets inside zero trust, how us cyber security strategy effects allies, driving change in cyber security today, zero trust in cyber security today For more: CyberCrimeJunkies Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption ( https://www.digitalassetredemption.com /), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercrime 02:00 Introduction to Ransomware Negotiation 03:04 The Journey into Cybersecurity 06:13 Understanding Ransomware Attacks 09:00 The Art of Negotiation with Threat Actors 11:53 Case Studies in Ransomware Negotiation 16:00 The Role of Cyber Insurance 18:49 Incident Response Planning 21:57 How To Deal With Online Extortion 25:09 The Business of Ransomware 30:04 Secrets To Cyber Crime Discussions 33:19 Understanding Cybersecurity Threats 36:03 Understanding Ransomware Payments 39:09 Supply Chain Attacks and Data Exfiltration 43:28 Proactive Cyber Defense Strategies 47:05 The Importance of Threat Intelligence 51:52 Preparing for Cyber Incidents Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today, effective communication for security internally in business, new approaches to enter the cybersecurity field, and best ways to keep up to date on security news. Also discussed cybersecurity careers for military, military to cybersecurity careers, ways to transition from military into cybersecurity, how to transition from military into cybersecurity today. Connect with Josh : https://www.linkedin.com/in/joshuacmason/ Here's Policy Wizard training we mentioned: https://www.policywizard.io/ VIDEO Episode Link: 👩‍💻 https://youtu.be/uVMcnl-PNT4 🔔 Want 💎 EXCLUSIVE💎 Content? For only $4 💎 SUBSCRIBE to Cyber Crime Junkies PRIME https://www.buzzsprout.com/2014652/supporters/new /LETS CONNECT/ We Really want people to be able to Watch and Listen and we would love your help. 📲 📲 PLEASE CONSIDER SUBSCRIBING to our Youtube Channel. It's FREE and it will help us to help others. 📲 📲 Our Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg Our /SOCIALS and PODCAST/ 📲 DAVID MAURO Linkedin: https://www.linkedin.com/in/daviddmauro/ 📲 Cyber Crime Junkies Linkedin: https://www.linkedin.com/in/cybercrimejunkies/ 🔔 Site, Research Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
Zero Trust. New Approaches to Social Engineering. Video Episode : https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec ( https://veteransec.org/), a non-profit that helps military build their cybersecurity careers. We cover key topics: New approaches to understanding zero trust, New Approaches to understanding social engineering , best cybersecurity practices for business, best policies to limit cyber liability, best practices identity protection, business benefits for having security assessments done, educating on security by podcasting, how intelligence gathering is critical to security, how to communicate effectively internally in business, impact the new us security strategy have on ai, innovative ways for security education, latest security expert insight, lowering risk of a data breach by security awareness training, new approaches to security awareness, new ways to limit cyber liability, newest ways to protect your identity online today, social engineering the science behind it, top security tips we all want to know, understanding the hacker mindset, understanding the neuroscience of social engineering, ways to stop social engineering. Audio Podcast: Available Everywhere. Thanks for Listening and Watching. PLEASE CONSIDER SUBSCRIBING. It's FREE and it will help us to help others. Our Video Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents highlighted critical vulnerabilities in Oracle's infrastructure and the importance of timely detection and response. The aftermath included a class action lawsuit and ongoing investigations, emphasizing the need for robust cybersecurity measures and transparency in handling breaches. Catch the Video: https://youtu.be/YWAmzPmG0YM Takeaways • Oracle was breached twice in early 2025, raising alarms. • The first breach compromised healthcare data via outdated servers. • The second breach involved an inactive legacy system. • Hackers exploited known vulnerabilities to gain access. • Delayed detection allowed unauthorized access for weeks. • Oracle's response included denying the breaches initially. • A class action lawsuit was filed against Oracle for negligence. • Legacy systems pose significant security risks if not decommissioned. • Timely detection and monitoring are crucial for cybersecurity. • Organizations must prioritize patch management and system updates. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cyber crime gangs including EXCLUSIVE DISCUSSION ON BLACK CAT RANSOMWARE GANG and Anatomy of a Social Engineering attack. Topics: understanding cyber crime mind, new insight on true cyber crime examples, new insight on cyber crime gangs, best ways to keep up to date on security news, best ways to limit cyber attack liability, best ways to protect business from cyber crime, and brand protection with identification authentication. John has a huge following: 2 Million Youtube subscribers, 570k+ Twitter followers and 250k+ Linkedin Followers! Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
What if the hackers are actually the heroes ? In this mind-blowing episode , host David Mauro sits down with Matt Toussain , elite military cyber warrior, DEF CON speaker, and Founder of Open Security , to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threats. 🎖️ From serving in the U.S. Air Force as a Senior Cyber Tactics Lead , to becoming a NetWars Champion and SANS instructor, Matt shares battle-tested insights and introduces Sirius — the groundbreaking open-source vulnerability scanner that’s changing the game. 🚨 Whether you run a business or just want to finally get serious about cybersecurity, this episode is PACKED with unfiltered truth, practical strategies, and behind-the-scenes access to the front lines of cyber warfare. Takeaways • Matt Toussaint's journey from military to cybersecurity is inspiring. • DEF CON is a great platform for new voices in cybersecurity. • Penetration testing is crucial for identifying vulnerabilities. • Real-world examples highlight the importance of cybersecurity. • Sirius is an open-source vulnerability scanning tool. • Organizations often overlook basic security practices like password management. • The Colonial Pipeline incident serves as a cautionary tale. • Effective remediation is key after penetration testing. • Cybersecurity is a constantly evolving field. • Networking at events like DEF CON can lead to valuable connections. Password management is a significant challenge for organizations. • MSPs often lack the resources to provide adequate security. • Outsourcing IT can lead to increased tech debt and security risks. • Incident response requires a deep understanding of the threat landscape. • Nation-state actors pose unique challenges in cybersecurity. • Prosecution of cybercriminals is complicated by international law. • Geopo Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Follow Us: 🔗 Website: https://cybercrimejunkies.com 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!…
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Quick Reference Guide

Listen to this show while you explore
Play