
Cyber Crime Junkies
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
Episodes
245 episodes
New Alert. 🚨 Don't Fall For The New Google Subpoena🚨
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real?🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing
•
Season 6
•
1:39

Zero Trust, SMB & National Security. INTEL CTO Exclusive.
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9oSteve Orrin, Federal CT...
•
Season 6
•
Episode 62
•
1:01:40

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with ...
•
Season 6
•
Episode 75
•
58:15

How start a career in cybersecurity today. Josh Mason
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military i...
•
Season 6
•
Episode 63
•
56:21

Zero Trust. Social Engineering. Ron Woerner.
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to un...
•
Season 6
•
Episode 67
•
44:18

Oracle Breach 2025 🎯 How Hackers Attack
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the ...
•
Season 6
•
Episode 74
•
35:53

Hunting Down Hackers. John Hammond Exclusive.
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQExamples with advice from top security content creato...
•
Season 6
•
Episode 4
•
1:00:59

🔥 How Hackers Can Protect Your Business | AI Risks & DEF CON Secrets🔥
What if the hackers are actually the heroes?In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Securit...
•
Season 6
•
Episode 73
•
58:42

Mind Games: Exploring Brain Reactions in Social Engineering
We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing.
•
Season 6
•
Episode 10
•
52:29

CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson.
🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime.Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. ...
•
Season 6
•
Episode 25
•
51:15

Hacking Humans Using Science
Chris Hadnagy, Best-selling author, security expert and CEO of Social Engineer, LLC, join sus to discuss hacking humans using sacience.Topics: understanding science in social engineering, hacking humans using science, neuroscienc...
•
Season 3
•
Episode 9
•
57:08

The Undetected. Espionage and Spies.(Part 2)
Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches:1. the Anthem Breach, 2. The Equifax breach, <...
•
Season 6
•
Episode 60
•
30:23

The Undetected. Espionage and Spies.(Part 1)
There is a bigger story behind some breaches:1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and&nb...
•
Season 6
•
Episode 59
•
31:08

PowerSchool Exposed-🔥-Children at Risk at School
🚨New Episode 🚨We dive into PowerSchool Exposed-- Children at Risk at School, about the significant cybersecurity breach at PowerSchool, which exposed sensitive data of millions of students and teachers. It emphasizes the importanc...
•
Season 6
•
Episode 72
•
28:48

The Shocking Rise and Fall of 23andMe. Exposed.
We expose and discuss the rise and fall of genetic testing company 23andMe. On September 13th, 2024 the once popular genetic testing company “23andMe” agreed to a $30 million settlement stemming from a data breach that affected nearly 7 mill...
•
Season 6
•
Episode 71
•
26:31
.png)
Start-Up Fraud Stories. How They Caught Elizabeth Holmes.
This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict.The technology never worked as promised. Was her intent to hope that the tech would “catch up”...
•
Season 6
•
Episode 35
•
52:05

Spotting Fraud Before it's Too Late. Brett Johnson Exclusive.
Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber li...
•
Season 6
•
Episode 64
•
47:36

The FRANK Scandal Exposed-- When A Lie Becomes Criminal
The conversation delves into the rise and fall of Charlie Javice, a once-celebrated fintech entrepreneur whose startup, Frank, promised to revolutionize student financial aid. However, her claims of a vast user base were fabricated, leading to ...
•
Season 6
•
Episode 65
•
25:34

FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, ...
•
Season 5
•
Episode 45
•
32:39

Sony Hack Decoded--Behind Scenes with A Real Hacker
🔥 Stay with us as we explore The SONY hack-decoded and take you Behind Scenes with a Real Hacker. In this episode we go Behind Scenes with A Real Hacker where Cyber Crime Junkies, host David Mauro, interviews Cody Kretsinger, a form...
•
Season 6
•
Episode 58
•
51:19

Shocking Fraud Attempts To Watch Out For
Expert Ayelet Biger of Scam Rangers joins us for Shocking Fraud Attempts To Watch Out For and even more shocking ways to protect personal data and best practices fraud protection. We address newest...
•
Season 5
•
Episode 46
•
53:22

How To Build A Security Culture. WIZER Security Founder.
Gabriel Friedlander, founder of Wizer Security, join us. Founded in 2019 and now in over 20k organizations across 50 countries, including the great local city of Indianapolis Indiana in heartland of the US Wizer training dem...
•
Season 5
•
Episode 48
•
34:05
.jpg)
From Hacker to Hero: The Michael Calce Story – How 'Mafia Boy' Took Down The Internet
SummaryThis episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacki...
•
Season 5
•
Episode 13
•
30:50

Missing CEO. Dead or Alive.
Story of A dead or missing CEO, Gerald Cotten, CEO of Quadriga CX, the largest Exchange in Canada. Topics: missing ceo dead or alive, the ultimate exit scam, exit scams explained, faking death for cyber crime, exist scams for cyber crim...
•
Season 5
•
Episode 47
•
1:00:40
.jpg)
Best ways to keep up to date on security news. Latest Cyber Crimes.
Best ways to keep up to date on security news. Latest Cyber Crimes. So many cybercrimes and so little time. Every week we get inundated with news affects our personal and professional lives. How do we sta...
•
Season 1
•
Episode 12
•
44:55
