Cyber Crime Junkies

Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk.Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

Baby Al Capone. New Wave of Online Violence Stories.

Higher Education under Cyber Attack. Clemson CISO John Hoyt.

Hackers vs Businesses Leaders XX Battle of Cyber Interruption XX

Cyber Crime Take Down Story. LOCKBIT.

FINAL COUNTDOWN. US Tik Tok Ban. What To Know.

Overcoming Bias in Tech and Cybersecurity.

Attack of the Deepfakes. New AI Risks for Business.

You Can Stop Breaches. Exclusive CISO Insight.

Negotiate Like Life Depends on It. Chris Voss.

The Undetected. Espionage and Spies.(Part 2)

The Undetected. Espionage and Spies.(Part 1)

Floodgates. Jury Trials. Anatomy of a Breach.

LIVE: Guarding the Gate. Emerging Threats. Protecting Your Life Online.

AI and Your Privacy. Digital Citizenship Today.

EXPOSED-Cyber Crime Behind The Scenes. Brett Johnson Story

Why We Must Measure Cyber Risk. CEO Interview.

FBI Day In the Life. How FBI Fights Cybercrime.

Crypto Fraud Exposed - How Cyber Crime Turns Violent

Info Stealers Exposed. Protecting Identities Online.

Unmasking Cyber Threats with a Master Storyteller

Weird Dangerous Findings on The Dark Web

Cyber Risk Unleashed. Latest Threats To Business.

OPEN AI News Today. Changes Announced.

The Shocking Rise and Fall of 23andMe. Exposed.

Cyber Careers Demystified. What Employers Want.

Biggest Cyber Insurance Mistakes To Avoid

AI Showdown: Deepfake Dangers. Who's Winning the Race?

Death in Crypto Land. Ultimate Exit Scam.

How to Measure Cyber Risk Today: Guidelines for Leaders

Protecting Identities - Best Practices and Fraud Prevention

The Power Behind the Headlines-Media Relations Effect on Cyber Security

Historical Context of Generative AI. AI And Humanity.

How Parents Can Protect Children Online.

Hacking Big Tech. Bryan Seely Interview.

Biggest Data Breach in Modern History. What To Do Now.

What Happened to UBER. How Uber Broke Trust.

The Aftermath. Navigating Reputations and Protecting Your Brand Image

When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses

Deceptive Realities: Unmasking the Threat of Deep Fakes in Cybersecurity

Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail"

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure

How Ransomware Can Kill. Ways To Build Security Resilience.

The Dark Side - New Ways AI is used in Social Engineering.

Unmasking Invisible Threats: Quantifying Cyber Security

Power of Storytelling in Cybersecurity

Audit Armor: Enhancing Compliance with Security Insights - Featuring Expert Paul Perry

Evolution of the Hacker Mindset. Lessons from 2011 SONY Breach and Beyond

Do Social Media Companies Protect Children. CYBER FLASH POINT.

Emotional Firewalls: Mastering EQ to Outsmart Global Cyber Threats

AI Ethics Unveiled: Navigating Cybercrime and a Broken Industry

Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security

No Exit-When Data Back Ups Fail

Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.

Are you at Risk? Personal Liability Cyber Breaches.

Cyber Flash Point. Breaking News on Insider Threats to US Organizations

When Gamers Start Swatting: Violence for Hire Online

Secrets Found In The Dark Web

Mind Games: Exploring Brain Reactions in Social Engineering

Inside the Mind: Unveiling Cyber Criminals' Motives and the Real-World Dangers of Ransomware

From Hacker to Hero: The Michael Calce Story – How 'Mafia Boy' Took Down The Internet

Rise And Fall of Crypto Star. FBI most wanted, Ruja Ignatova. Crypto News.

Cyber Flash Point. Devastating Ransomware Attack on Auto Industry. CDK Global.

FBI vs Cyber Crime. EXCLUSIVE Scott Augenbaum Interview.

Cyber Security Differences Between US Versus UK

How Everyone Is Responsible For Cyber Security. Phantom CISO.

Unlocking Unity: The Power of Civil Discourse and Protecting Online Privacy in America

New! Cyber Flash Points. Season 5.

Safeguarding Your Privacy: How to Delete Your Data

Caught: The Williams Woods Identity Theft Story - A Shocking Twist.

Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk

Phone Rings. It's A Social Engineer Callling.

Customers or Enemies Online.

Zero Trust, SMB & National Security. INTEL CTO Exclusive.

New Approaches to Enter the Cybersecurity Field

New Insight on True Cyber Crime Examples.

Impact of AI on Business Cyber Risk

Innovative Ways to Reduce Website Spoofing

How Secrets in Hostage Negotiation created Never Split The Difference. Pt 2.

Inside Story of Chris Voss and Never Split The Difference Pt 1

TV Wars and Espionage.

The Story Behind the Sony Data Breach 2014

New Ways to Take Control Over Data Privacy with Kurt Long.

Modern Ways to Improve Presentation Skills with Nausheen Chen.

New Ways to Reduce Risks from Deep Fake

New Ways Leaders Can Assess Their Risk Appetite

How To Stay Updated In Cyber Security and Business

Hidden Cyber Security Risks In Software-As-A-Service (SaaS) Platforms

How To Plan For Ransomware

New Update. Check out what's coming.

How Business Can Transfer Cyber Risk

UBER Crime Story 2. How Security Leaders Can be Liable.

Missing CEO. Dead or Alive.

Start-Up Fraud Stories. How They Caught Elizabeth Holmes.

A Story of Innovation in Privacy. Merry Marwig.

Why Facebook Was Down. Exit Scams and Cyber Crime.

How To Reduce Risk When Managing Data Privacy. Merry Marwig.

New Ways to Stop Online Predators

Crime Stories Exposing Cyber Criminals

War Games. In Business.

AI Effect on National Security.

US Secret Service in Action. Exclusive.

Art of CyberWarfare & Exclusive Insight into LOCKBIT. Expert Jon DiMaggio.

Inside Secrets to Epic Hacks with a Celebrity Hacker Chris Roberts.

Spotting Fraud Before it's Too Late. Brett Johnson Exclusive.

Newest AI Dangers To Watch For. Brett Johnson Story.

Notorious Hacker, Chris Roberts. How Hackers Protect You.

Horror Stories Of When Data Back-ups Fail

How to Stop Social Engineering. Shocking Science Behind.

How the FBI fights Cyber Crime. Four Truths.

Update-Cyber Crime Announcement

New Ways to Buy Technology

Making Small Organizations Hack Proof

Shocking Facts to know. MOVE IT Breach.

A.I. Modern Warfare & Fiction

BREAKING Cyber News: FBI vs. BLACK CAT.

Unveiling the Most Anticipated Season 4. Best is Coming!

Is Ransomware Dead? What Cyber Criminals Are Saying.

New Undercover Dark Web Investigations

FBI Profiling & Negotiation.

Star Athletes & Influencers. Identity & Brand Protection

Shocking Fraud Attempts To Watch Out For

Brett Johnson Interview. Latest Cyber Perils Facing Business.

How Hackers Help Business

How to Become a Top Hacker for Business

Hacking Humans Using Science

FBI vs Cyber Crime

Face to Face with Cyber Criminals.

Explaining threat intelligence. Crowdstrike CTO Cristian Rodriguez

How Hackers Protect You. Hacker/CISO Chris Roberts Interview.

Negotiating with Cyber Criminals. Expert Eric Taylor.

Inside Reality of Data Breach. First-Responder Chris Loehr.

Behind Scenes of LOCKBIT. Cyber Crime. Jon DiMaggio Interview.

Experts Who Hunt Cyber Criminals. Legendary John Hammond Interview.

Playlist. 31 Explosive Episodes Coming.

A.I. to Improve Human Engagement

Start Your Engines: October 31-Day-Challenge. Come Learn, and Share!

How To Avoid Career Land Mines

Common Sense Cyber Security. Innovative Ways To Stop Cyber Crime.

Fall of a Cyber Crime Gang

How To Bring Social Responsibility To Crypto

Breach of The Decade. MOVE IT 2023

Crossing The Line. Behind Insider Threats.

Negotiating with Cyber Criminals. Behind Scenes.

What is meant by governance risk and compliance? with Gerald Auger

Largest Healthcare Breach This Year. Latest Move IT Breach 2023

Behind Scenes When Ransomware Strikes

How Self Sovereign Identity Can Protect You Online

Overcome Workplace Villains. Heather Monahan Interview.

How To Build A Security Culture. WIZER Security Founder.

New Approaches for Career in Security

Who Caused the Sony Pictures Data Breach

Your Identity For Sale on Dark Web Today,

Shocking New Tricks Used In Cyber Crime Today

Digital Mental Health Support. Johnny Crowder.

Parenting Today with Social Media

Frightening Truth of Synthetic Media

The Downfall of Toys R Us. Part 2.

The Downfall of Toys R Us. Part 1.

Blind Spots. Where Danger Lives. Huxley Barbee Interview.

How to Drive Social Responsibility Today

Newest Ways To Educate In Security

AI Changing Security Awareness Training

Zero Trust. Social Engineering. Ron Woerner.

JOHN HAMMOND. Hacker. Legend.

Ransomware Real Life Stories Effect On People. PART 2

Ransomware Real Life Stories Effect On People. PART 1

Exclusive Brett Johnson Interview.

Human Story Behind Ransomware. Exclusive. Jon DiMaggio.

New Approaches to Enter Security. Deidre Diamond, Cyber SN

Identity and Brand Protection. Hannah Sutor.

Quick Update. Coming Soon. Breaking Cyber Crime Stories We Need to Know.

Undercover In a Cyber Crime Gang. Shocking LOCKBIT Reveal.

Redemption. New Insight from the Cybercrime Godfather, Brett Johnson. PART 2 (of 2)

Redemption. New Insight from the Cybercrime Godfather, Brett Johnson. PART 1 (1 of 2)

Operational Resilience in Security.

Break in. Offensive Security. Hacker Phil Wylie.

How AI will Effect Cyber Security. New insights from Cyber Security Think Tank.

Security Jobs Industrial Control Systems. Dragos' Josh Fullmer

TIKTOK Ban. Social Media National Security

What We Can Learn From Linus Youtuber Hack

What's New and Next. Join us LIVE and Upcoming Episodes.

Overcoming Odds. Inspiring Story. Unexpected Rise to Leadership.

Newest Approaches In Security Careers. ESPORTS CTFs and New Career Fairs.

Impact Of New Us Security Strategy on AI. Task Force Insight.

How a Think Tank Benefits Cybersecurity. Invitation to Join a top Think Tank.

Coming Next on our Cyber Crime Podcast. What to know.

Understanding the Hacker Mind. Phillip Wylie.

How to Build Security Culture Security

How to Communicate Effectively Internally in Business

What is a Cybersecurity Mindset. New Ways To Think About it.

Business Benefits for Having Security Assessments Done

Leveraging LinkedIn for Your Personal Brand (Series Pt. 2) Mike Miller/David Meece

LEVERAGING LINKEDIN FOR YOUR PERSONAL BRAND PROMO

Leveraging LinkedIn for Your Personal Brand (Series Pt. 1) TARA GOOCH

Exclusive New Lessons in Ransomware. Crime/Threat Intel. Gary Ruddell-Perspective.

Breaking Down Top Cybersecurity News. Exclusive FBI Perspective.

Latest Cyber Crime Stories. Top News & Insight.

How To Spot Fraud in Business. Expert Galina Guidry.

Best ways to protect business from cyber crime. What To Know.

Elizabeth Holmes & Theranos. A True Cyber Crime Story.

New Ways to Enter Cybersecurity with Expert Chris Romano

Best ways to keep up to date on security news. Latest Cyber Crimes.

Legal liability for business owners for data breaches. Expert Matt Lee

New Strategies for handling stress in the workplace. JAY ABBASI.

Inside the Ukraine War. Cybersecurity Perspective

Insider Threats with Top Global CISO Nick Ryan

How To Stop Horror Stories for Elderly and Children Online.

Inside The Mind of A Notorious Hacker. Meet Expert Chris Roberts. PART 1

What its like to be a victim of cyber crime. True Story.

Find an Exciting New Career. Women In Tech Perspective.

Exclusive Update: Frightening Attack on Health System

How to Understand What Clients Really Want

The Biggest Breach In History. What You Need to Know.

WE WORK. The Rise & Fall. A True Cyber Crime Story.

What You Need to Know About The 4 Truths about Security with FBI Expert Scott Augenbaum

How To Create Limitless Learning with Award Winning Inventor Mike Acerra

What To Know About New Social Engineering & Career Guidance with Expert Ron Sharon

What Employers Want in Security. Mike Miller.

Security Tips we all want to know. John Young

Fall of Iconic MYSPACE

Pilot Episode. A Changed World and Why True Crime Stories Matter

Blood Culture. Elizabeth Holmes and The Fall of Theranos

FBI Most Wanted. Ruja Ignatova. Story of OneCoin.

Billion-Dollar Health Fraud. Elizabeth Holmes

Protecting your Identity and Brand. Expert Panel Discussion.