Episoder
-
NEW! Text Us Direct Here!
Audit Armor: Enhancing Compliance with Security Insights - Featuring Expert Paul Perry. How to Improve Compliance Audits with Security in Mind
Paul is a CPA, a Member of the Warren Averett firm and practice leader of the Security, Risk and Controls Group. Paul and his team @ Warren Averett focus on cybersecurity, risk assessments, internal controls & internal for major clients across the globe.
We spoke about How to Improve Compliance Audits with Security in Mind.
A practical conversation about what compliance audits are, and what they are not in the way a holistic approach and not just checking a box is key to brand growth and brand protection.
In this episode we discuss: compliance versus security, role of compliance in security, and how to stay compliant and secure.
Itβs a conversation that small to midsize businesses have, as well as entrepreneurs across the globe. It gets to the very heart of what keeps the brand intact.
Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Join us as Cody Kretsinger shares his journey from the blind arrogance of youth and dark side of hacking to his evolution into the brilliant, community thought leader and leading-edge cybersecurity provider. Itβs a unique perspective on protecting against cybercrime and understanding Modus operandi.
Chapters
00:00 Introduction to Cybercrime and Hacking
07:00 The Thrill of Finding Vulnerabilities
13:40 The Role of the NSA in Cybersecurity
18:24 The Sony Pictures Hack: Exposing Laughable Security
26:05 The Consequences of the Sony Pictures Hack
27:31 Introduction and LulzSec's Actions
29:48 The Raid and Destruction of Evidence
30:17 The Hacker Mindset and Facing Consequences
34:57 The FBI Raid and Arrest
43:47 Transitioning to Cybersecurity and Red Teaming
49:03 Importance of Security Culture and ComplianceAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
Mangler du episoder?
-
NEW! Text Us Direct Here!
This Cyber Flash Point addresses the question: Do Social Media Companies Protect Children. We review New Laws passed to hold social media companies accountable for protecting children and discuss the YAHOO BOYS.
Summary
The conversation covers two main themes: online privacy protection for children and the use of deepfake technology in financial sextortion scams.
The first theme discusses two bills, the Social Media Privacy Protection Act and the Children and Teens Online Privacy Protection Act, which aim to enhance privacy and transparency on social media platforms.
The second theme explores the tactics used by the Yahoo Boys, a group known for orchestrating financial sextortion scams, including the use of real-time face tracking and deepfake technology. The conversation emphasizes the need for greater accountability in the tech industry and proactive measures to protect against online scams.
We cover: how romance scams work on social media, latest news on protecting children online, latest news on online privacy protection, who are the yahoo boys, online privacy protection, latest deepfake news, romance scams, dating scams, latest crypto news, crypto scams, deepfake technology, financial sextortion scams, and focus on the Yahoo Boys.Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI.
We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how international law enforcement leverages Emotional Intelligence, and how it can be learned and trained.
Find more on Nadja here: https://www.thrivewitheq.com/
Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
We interview Steve Orrin, the CTO of Intel, who essentially make the chips (brains) of most computers on the planet. We discuss these topics: Controlling AI Ethically, how to control AI ethically, what are the ethical considerations of AI, use of AI in cybersecurity, use of AI in cybercrime, deep fakes, zero trust and more.
There is a special discussion inside so don't miss it!Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world.
She served four combat zone tours in Iraq and Afghanistan as a Case Officer and Detachment Chief and served as a Supervisory Branch Chief in Europe.
Chapters
00:00 Introduction and Background00:30 Shawnee's Expertise in Cybersecurity and Counterintelligence02:21 The Influence of Shawnee's Family and Childhood04:01 Shawnee's Work with the Defense Intelligence Agency08:04 Stories from Shawnee's Government Service15:07 Difference Between Insider Risk and Insider Threat20:01 Mitigating Insider Risk and Threat24:28 Security Awareness and Training Programs32:12 Building a Security Culture41:27 Insider Threat Program at Uber46:12 Lessons Learned from Uber52:41 Upcoming Books on Insider Threat and Cybersecurity EducationAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail and how to plan accordingly.
SummaryIn this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and cybersecurity. They discuss the challenges of patching vulnerabilities, the importance of data backup and recovery, and the role of the CISO in securing an organization.
They also share a story about the impact of data loss during Hurricane Katrina and the need for proper retention policies. In this conversation, Dino Mauro and Gabe Gumbs discuss the importance of having a paper trail and making recommendations backed by evidence in cybersecurity. They emphasize the need for strategic thinking and the use of advanced threat hunters and platforms to detect and prevent breaches.
They also highlight the importance of making an internal business case for cybersecurity investments and quantifying the ROI. The conversation touches on the different impacts of breaches, the challenges faced by small businesses, and the potential for a grading system or informal evaluation of vendors based on their handling of breaches.Chapters
00:00 Introduction and Podcast Overview01:05 Gabe Gimble's Background and Journey into Technology and Cybersecurity03:26 The Challenges of Patching Vulnerabilities05:48 The Importance of Data Backup and Recovery08:12Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec, an crowd-sourced WAZE-Like Security platform.
Learn more here: https://crowdsec.net
Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives.
The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of cyber insurance and the potential risks and liabilities that businesses face in the event of a cyber breach. They emphasize the need for businesses to proactively plan and implement cybersecurity measures to mitigate these risks. They also highlight the changing landscape of cyber insurance policies and the need for businesses to stay informed about exclusions and coverage limitations. The conversation concludes with the reminder that businesses should consult with subject matter experts and develop a comprehensive cybersecurity roadmap.
Chapters
00:00 Introduction to Cybersecurity Insurance02:18 Changes in the Insurance Industry06:11 Importance of Accurate Application Process09:34 Personal Liability for CEOs and Executives13:54 Regulatory Scrutiny and Enforcement Actions19:40 Lessons from the SolarWinds Breach26:54 The Changing Landscape of Cyber Insurance27:23 Addressing Legacy Hardware and Software Exclusions35:05 Understanding the LAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
How would you know if a seemingly perfect employee was actually an imposter? Behind this facade was a North Korean operative, a meticulously trained spy. In Cyber Flash Point we cover Breaking News on Insider Threats to US Organizations.
Topics: Insider Threats to US Organizations, how to reduce insider threats, top cyber flash points, Insider Threat, how the DRPK uses it workers for cybercrime, common insider risks in security, new types of insider risks in security, stories of insider risks in cyber security, containment, vetting processes, security monitoringAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online.
Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Summary
This conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, including passwords and personal information. The conversation also delves into the operations of cybercrime gangs and their recruitment of cyber mercenaries. It highlights the role of anonymity and encryption in the dark web and provides cautionary tales of individuals who have been caught and arrested for their involvement in cybercrime.
The dark web is a hidden part of the internet that allows for anonymity and access to illegal activities.Stolen data, including passwords and personal information, is readily available for sale on the dark web.Cybercrime gangs operate like cartels, recruiting cyber mercenaries for specific tasks in campaigns.The dark web is a breeding ground for cyber attacks, including ransomware and social engineering.Law enforcement agencies face challenges in tracking down individuals on the dark web due to encryption and anonymity.
TakeawaysSound Bites
"Shining a light on the dark web""Double extortion: locking down data and demanding ransom""Rent-A-Hacker: hiring cyber criminals for various tasks"Chapters
00:00 Introduction to the Dark Web07:24 The Significance of the Dark Web11:46 The Sale of Stolen Data19:19 Inside Cybercrime Gangs23:28 Recruitment of Cyber Mercenaries37:44 Challenges in Tracking Down Dark Web CriminalsAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing.
Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/
Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi).
Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs and how they drive their operations. This allows us to better defend ourselves and the organizations brands we serve.Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Summary
This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of controlling and commanding it. He joined an elite Russian hacker group called TNT and used their resources to carry out his attacks. Despite covering his tracks, Michael was eventually caught due to his bragging in IRC chat rooms. He was sentenced to probation and has since become an ethical hacker, raising awareness about cybersecurity.Chapters
00:00 Introduction: The Early Years of Michael Calce06:39 Joining the TNT Hacker Group18:29 The Takedown: Bringing Down Major Websites23:26 The Arrest and Aftermath28:10 The Changing Landscape of Hacking29:05 Conclusion: From Cybercriminal to Ethical HackerAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Crypto News, Cyber flash point about self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova.To Submit a TIP and Potentially collect the new $5 Million Reward, you can submit a tip online at www.tips.FBI.gov
Or Call 1-800-CALL-FBI
The rise and fall of ONE COIN and the hunt for Ruja Ignatova is a story of a massive cryptocurrency Ponzi scheme that attracted over $4 billion in investments. Dr. Ruja Ignatova, the charismatic founder of ONE COIN, presented it as a revolutionary cryptocurrency accessible to everyone. Investors were drawn in by her impressive credentials and persuasive presentations.
However, investigations revealed that ONE COIN lacked genuine blockchain technology and was a fraudulent scheme. Ignatova disappeared in 2017 and remains on the FBI's most wanted list. Her brother and co-founder, Sebastian Greenwood, and other accomplices have been arrested and sentenced.Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Joining us is Matthew Rosenquist, a renowned CISO, Cybersecurity leader and strategist, about the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks.
Connect with Matthew:
Webpage: www.cybersecurityinsights.usLinkedIn: https://www.linkedin.com/in/matthewrosenquist/ Cybersecurity Insights channel: https://www.youtube.com/CybersecurityInsightsAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
In today's cyber flash point, we show you how to digest recent data breaches and how to take action against cyber crime.
Have you ever wondered how a single cyberattack can cripple an entire industry? Or how businesses can recover from such a devastating blow? Ever realize the cyber security risks from SaaS platforms? Today we dive into the gripping tale of the ransomware attacks on CDK Global, a leading provider of dealer management systems (DMS) for car dealerships across North America.
Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Former FBI Special Agent who served with the FBIβs original Cyber Crime division, well respected public speaker, author and TV consultant on personal cybersecurity education Scott Augenbaum joins David Mauro in the studio.
We discuss: how a cyber security mindset works, how fbi fights cyber crime, personal cybersecurity education, cyber security mindset, individual user audits, how to educate users, and how cyber crime is like the mafia.
https://CYBERSECURITYMINDSET.comAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! -
NEW! Text Us Direct Here!
Richard Hollis of Risk Crew (https://www.riskcrew.com) in London joins Cyber Crime Junkies studio (https://cybercrimejunkies.com) for exclusive discussion on: cyber security differences between US versus UK, how cybersecurity efforts usually fail and Difference between customers or enemies.
Don't miss the video episode: https://youtu.be/5jjlJx_EyXIAccelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.
"Cyber Flash Points" β your go-to source for practical and concise summaries.
So, tune in and welcome to "Cyber Flash Pointsβ
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes! - Se mer