Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime.Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcastDive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
📻 Siste episoder av Cyber Crime Junkies
Her er de nyeste episodene tilgjengelige via RSS-feeden:
Your Boss's Voice is an AI Clone Now | Latest Social Engineering Risks Exposed (00:51:38)
New Episode🔥We sit down with Kyle Ryan, Senior Manager of AI and Engineering at Dune Security, to break down their never-before-published Intel Report. We're talking deepfake voice calls, AI-generate...
🔥Marketing Warfare: How A New Framework is IGNITING Small Business Growth (00:54:42)
David Mauro and co-host Zach Moskow engage with Kevin McGrew, author of 'The New Rules of Marketing Warfare.' They discuss the intersection of marketing and leadership, emphasizing the importance of f...
How AI Agents MOLTBOOK and OPENCLAW Steal Your Data (00:01:53)
New Episode🔥The Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats...
NIKE ROBBED! Not What You Think (00:01:33)
NIKE ROBBED! Not What You Think. The Cybercrime Junkies show dives into the Nike Breach, the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros ...
Romance Scams, Space Breaches, and a Nike Heist Nobody Saw Coming | CHAOS Panel (00:46:05)
Hackers aren’t stealing passwords anymore. They’re stealing what makes companies valuable. We cover: • The European Space Agency breach and why even elite organizations aren’t safe • Pig butchering ...
Hiring Fraud Exposed! Latest AI Threats to Business. (00:29:19)
🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud i...
Nike's Worst Nightmare Just Happened (00:01:44)
Nike's Worst Nightmare Just Happened. The Cybercrime Junkies show dives into the NIKE breach, the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned ...
Hackers stole The HEART of Nike. | A Nightmare! (00:01:43)
Hackers stole The HEART of Nike. | A Nightmare! The Cybercrime Junkies show dives into the NIKE BREACH and what it means, covering the world of cybercrime and cybersecurity, offering insights for cybe...
AI Changed Social Engineering. New Verification Rules to Know TODAY! (00:01:56)
AI Changed Social Engineering. New Verification Rules to Know TODAY! If you didn't independently confirm the human using a channel you know is legitimate, you didn't verify anything. You placed your t...
Why Cyber Attacks are Not All Equal (00:33:00)
Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Bre...
Unveiling the MOST DANGEROUS AI Risks at Work! (00:43:01)
New Episode🔥We explore the importance of proper AI adoption, NIST AI risk management framework and regulatory compliance. Understanding ai governance and having a clear ai policy are crucial for effe...
Modern Ways to Improve Presentation Skills with Nausheen Chen. (00:50:55)
Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaki...
Baby Al Capone. New Wave of Online Violence Stories. (00:52:25)
Shocking True Crime Stories. Baby Al Capone, Swatting & SIM Swaps Mind-blowing episode about Violence-as-a-service, Dark Web forums, Deadly Swatting events and the unbelievable story of a 15 year ol...
AI's risks to small business EXPOSED. How Attackers Adopt Early 🎯 (01:04:01)
🔥 New Episode Alert! 🔥 A powerful conversation, David Mauro teams up with former Intel Security Executive and experienced CISO, Matthew Rosenquist, to break down the ai risks to small business. Disc...
Are YOU the Next Victim? STOP Leaving Your Life EXPOSED. (00:47:19)
New Episode🔥Guest Dan Elliott (vCISO with RECORDED FUTURE). We emphasize the critical need for robust vendor due diligence and continuous risk assessment to improve automation without compromising se...
FBI Profiling & Negotiation. (00:38:04)
We are joined today by special guest, former FBI special agent Nancy Aguilar, who had worked the Boston Marathon Bombing and other high-profile investigations. She is also the host and creator of Ba...
AI's NOT the Villain | Your Cybersecurity Flaws Are the BIG STARS! (00:47:19)
Have you ever noticed how we keep telling ourselves cyber risk is a “future problem” right up until it walks in the front door wearing a name badge? Because in this episode, we’re not talking about Ho...
Most Wanted Dark Web Hackers. Truth about Scattered Spider. (00:46:54)
🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wante...
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure (01:36:01)
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home ...
Higher Education under Cyber Attack. Clemson CISO John Hoyt. (00:56:47)
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how ...
Secrets Found In The Dark Web (00:48:43)
Summary This conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, inclu...
The Threat WITHIN | Psychological Cybersecurity (00:48:29)
Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Con...
Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works (00:48:46)
Why modern cybercrime targets trust, urgency, and decision-making instead of systems Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works Traditional fraud used to feel obvious: misspe...
How Parents Can Protect Children Online. (00:55:30)
Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World. We discuss: Common misconceptions and Par...
What's The FUTURE of QUANTUM? (00:47:54)
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER ...
Side 1 av 7
Cyber Crime Junkies - Gratis RSS Feed for Norsk Podcast | OpenPodMe | OpenPodMe - Åpen RSS for Norske Podcaster