Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Cyber Crime Junkies

Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

profile image
profile image

2 Listeners

bookmark
Share icon

All episodes

Best episodes

Seasons

Top 10 Cyber Crime Junkies Episodes

Goodpods has curated a list of the 10 best Cyber Crime Junkies episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Cyber Crime Junkies for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Cyber Crime Junkies episode by adding your comments to the episode page.

Cyber Crime Junkies - What Employers Want in Security. Mike Miller.
play

09/22/22 • 45 min

What Employers Want for Cybersecurity Careers. Expert Mike Miller.
BONUS VIDEO EPISODE
HERE.
Join us as we learn some unique approaches to entering the cybersecurity field and leveraging key social media platforms with author and expert, vCISO Mike Miller. Mike has a great new book "Break Into Cyber" showing us how to break into the field. You can grab your copy here: https://www.breakincyber.com/

Send us a text

Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

profile image
profile image

2 Listeners

bookmark
plus icon
share episode

Summary
This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of controlling and commanding it. He joined an elite Russian hacker group called TNT and used their resources to carry out his attacks. Despite covering his tracks, Michael was eventually caught due to his bragging in IRC chat rooms. He was sentenced to probation and has since become an ethical hacker, raising awareness about cybersecurity.

Chapters

  • 00:00 Introduction: The Early Years of Michael Calce
  • 06:39 Joining the TNT Hacker Group
  • 18:29 The Takedown: Bringing Down Major Websites
  • 23:26 The Arrest and Aftermath
  • 28:10 The Changing Landscape of Hacking
  • 29:05 Conclusion: From Cybercriminal to Ethical Hacker

Send us a text

Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

profile image

1 Listener

bookmark
plus icon
share episode
Cyber Crime Junkies - The Biggest Breach In History. What You Need to Know.
play

10/06/22 • 41 min

Today’s True Cyber Crime story is about a single click. A single distraction. The result was the largest data breach in the history of the internet. See how it happened, how espionage, foreign spies and questionable methods of communication plagued the company breached.

Also learn what specific steps we all need to take today considering this breach and others.

This is the true cyber crime story of YAHOO. See more episodes and cool stuff at CyberCrimeJunkies.com

Send us a text

Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

profile image

1 Listener

comment icon

1 Comment

1

bookmark
plus icon
share episode
Cyber Crime Junkies - Uber Breach and Trial. What You Need to Know.
play

09/19/22 • 60 min

Uber's Latest Breach & Trial of Former Security Head. What You Need to Know.
Breaking news discussion on Trial of the century involving the historic charges against internal CISO Joe Sullivan and the new UBER data breach, how it happened and what it means.

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Get Aura today! Complete Online Safety from friends at Cyber Threat Group.


bookmark
plus icon
share episode
Cyber Crime Junkies - Hunting Down Hackers. John Hammond Exclusive.
play

12/26/24 • 61 min

Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond.
Video episode here: https://youtu.be/CMOu0o9FvFQ
Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cyber crime gangs including EXCLUSIVE DISCUSSION ON BLACK CAT RANSOMWARE GANG and Anatomy of a Social Engineering attack.
Topics: understanding cyber crime mind, new insight on true cyber crime examples, new insight on cyber crime gangs, best ways to keep up to date on security news, best ways to limit cyber attack liability, best ways to protect business from cyber crime, and brand protection with identification authentication.
John has a huge following: 2 Million Youtube subscribers, 570k+ Twitter followers and 250k+ Linkedin Followers!

Send us a text

Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

bookmark
plus icon
share episode
Cyber Crime Junkies - Human Story Behind Ransomware. Exclusive. Jon DiMaggio.
play

05/17/23 • 61 min

Jon DiMaggio of Analyst 1 shares exclusive insight into the human story behind ransomware from the blockbuster release of Ransomware Diaries Volume 2 discussing the people behind ransomware attacks
We Discuss:
💡the human story behind ransomware,
💡Getting To Know The People Behind Ransomware,
💡why its important to understand cyber crime motives,
💡how to understand cyber crime motives,
💡understanding cyber crime motives,
💡why its important to understand cyber crime mo,
💡what it means to profile a criminal,
💡exposing people who cause ransomware attacks,
💡profiling the people who cause ransomware attacks,
💡understanding the people who cause ransomware attacks,
💡the people who cause ransomware attacks,
💡getting to know the people behind ransomware attacks,
💡who causes ransomware attacks,
💡behind scenes cyber criminals,
💡behind the mask cyber crime gangs, cyber crime gang discussions,
💡cyber crime gang under cover, cyber crime gangs under cover,
💡examples of cyber crime gang activities, examples of recruiting in cyber crime gangs,
💡exposed secrets of cyber crime gangs,
💡exposing cyber crime gang activities,
Full Video Episode: https://youtu.be/9t23ovSL29A
Audio Podcast: Available Everywhere.
Thanks for Listening and Watching.
PLEASE CONSIDER SUBSCRIBING. It's FREE and it will help us to help others.
Our Video Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Connect with us.
DAVID MAURO Linkedin: https://www.linkedin.com/in/daviddmauro/
Cyber Crime Junkies Linkedin: https://www.linkedin.com/in/cybercrimejunkies/
Cyber Crime Junkies Instagram:

Send us a text

Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

bookmark
plus icon
share episode

New Insight on Operational Resiliency and Crises Management. Top security tips we all want to know.
VIDEO EPISODE HERE
Got Policies? Do you feel many organizations do not have the proper policies in place to protect their brand? It appears many we speak with tend to struggle to have all the necessary ones. Most have never conducted any exercise to test them and identify gaps.
We sat down with Lester Chng, CISSP, former Naval Officer who learned a great deal about WAR GAES in the military and sees the benefits to large enterprise and SMB clients to practice executing their policies before reality sets in. He shared his practices for addressing this. He has significant recommendations for addressing the four (4) main areas of security:

1. Cyber

2. Phys

3. Fraud

4. Crises management

Lester Chng has a very cool story he shared with us. It’s a story of immigration (from Singapore to Canada), one of military career transition into civilian life and breaking into the cybersecurity field and his story is built on a foundation of grit. He is passionate about crises management exercises and the practice since it always identifies holes and gaps in policies.

Come try Blushingintrovert.com. Portion of all sales go to Mental Health Awareness efforts.

Support the show

We Really would love it if you could SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast

We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941

Explore More Podcast Content at https://cybercrimejunkies.com

Don't miss our Newsletter (no email needed!) VIGILANCE-Translating Cyber into Business. linkedin.com/newsletters/6941459114879311872

Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothes, plushies with portion of all sales going to Mental Health Research. https://blushingintrovert.com

Want to try podcasting yourself? Use RIVERSIDE today! We use it (after trying every other platform and we LOVE it) Sign up here today! https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies


bookmark
plus icon
share episode
Cyber Crime Junkies - UBER Crime Story 2. How Security Leaders Can be Liable.
play

03/12/24 • 58 min

This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable.
This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker gained access and the potential ways the breach could have been prevented. The trial of Joseph Sullivan is also discussed, with differing opinions on his actions and the verdict. The conversation highlights the impact of the breach and trial on the cybersecurity community.

Takeaways

  • · The breach raises questions about the effectiveness of security measures and the need for regular penetration testing.
  • · The ongoing trial of Joseph Sullivan, the former chief security officer of Uber, highlights the potential personal liability of cybersecurity leaders.
  • · The breach and trial have had a significant impact on the cybersecurity community, leading to a reevaluation of roles and responsibilities.

Chapters PART 2

  • 1:01 Trial of Joseph Sullivan
  • 2:01 Uber's Awareness of the Breach
  • 3:00 Hacker's Access and Screenshots
  • 4:19 How the Hacker Gained Access
  • 7:15 Understanding Hackers
  • 13:40 Multifactor Authentication Fatigue
  • 15:34 Moving Laterally and Pivoting
  • 17:26 Access to Uber's Systems
  • 18:23 Access to Cloud Services
  • 23:20 Bug Bounty Program
  • 25:14 Hacker's Boastful Behavior
  • 26:12 Prevention and Penetration Testing
  • 29:02 Ongoing Trial of Joseph Sullivan
  • 30:28 Previous Breach and Payment to Hackers
  • 33:23 Charges Against Joseph Sullivan
  • 35:18 Testimony of Uber CEO
  • 36:46 Testimony of Former In-House Counsel
  • 39:41 Turning the Breach into a Bug Bounty
  • 43:08 Defense

Send us a text

Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

bookmark
plus icon
share episode

Dont miss the Chris Hadnagy episode now live.! Here's why! A New Understanding of the Science of Social Engineering. Expert Chris Hadnagy.

Protect Your Children without invading their privacy and get alerted when they are at risk of cyber-bullying, suicidal ideation, online predators or need assistance for their safety. We use it to protect our own families.
Sign up and Protect your family with Bark using our affiliate Link Here.

New Exclusive Content at CCJ PRIME.
For less than 1 cup of coffee a month you can have it all.

Exclusive videos, in-depth interviews, Premium Resources for Skills training and Brand Building and Brand Protection. CLICK HERE TO SUBSCRIBE to PRIME. https://glow.fm/cybercrimejunkiesprime/.

Support the show
bookmark
plus icon
share episode
Cyber Crime Junkies - Latest Uber Trial and Arrest News. New Powerpoint Warning.
play

09/09/22 • 34 min

Latest Uber Trial and Arrest News. New Powerpoint Warning.
Blockbuster witness testimony exposed. Plus Breaking news on the
Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware.
Check out our new Marketplace now available on CyberCrimeJunkies.com

Want EXCLUSIVE content? We now have have a special offer for those who want Exclusive Member-Only benefits! Subscribe here and sign up for Prime Access Today! (https://glow.fm/cybercrimejunkiesprime/) Get EXCLUSIVE Special Resources, Career Guidance, Cool Documentaries, Exclusive VIDEO Episodes, & Proprietary Security Trainings!

Interested in Trying BARK to protect your Family Online? Use Our Code to sign up and get a 7-day Free Trial and save 41%
Code: Sign up here Our Link https://www.bark.us/?ref=MXQHQBJ

or use our Cyber Crime Junkies PROMO CODE: MXQHQBJ
We use Bark to Protect our Families. Let us know how you enjoy it!

Support the show
bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Cyber Crime Junkies have?

Cyber Crime Junkies currently has 245 episodes available.

What topics does Cyber Crime Junkies cover?

The podcast is about News, Stories, Brand, Management, Leadership, Business News, Podcasts, Truecrime and Business.

What is the most popular episode on Cyber Crime Junkies?

The episode title 'What Employers Want in Security. Mike Miller.' is the most popular.

What is the average episode length on Cyber Crime Junkies?

The average episode length on Cyber Crime Junkies is 45 minutes.

How often are episodes of Cyber Crime Junkies released?

Episodes of Cyber Crime Junkies are typically released every 2 days, 9 hours.

When was the first episode of Cyber Crime Junkies?

The first episode of Cyber Crime Junkies was released on Jul 21, 2022.

Show more FAQ

Toggle view more icon

Comments