Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.
undefined
Nov 22, 2025 • 54min

CAUGHT: Biggest Spy in US History--Spies, Lies & Cybercrime

Question? Text our Studio direct.🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling true crime story.Eric O'Neill, a former FBI operative, discusses his experiences in espionage, particularly focusing on the case of Robert Hansen, one of the most damaging spies in American history. Discover the shocking truth about the most dangerous spy in history, a master of cloak and dagger operations, who infiltrated even the most secure systems, exposing the dark world of cybercrime and the devastating consequences of betrayal. Learn about the insider threats that can compromise even the strongest cybersecurity measures, and how these threats can lead to catastrophic breaches. Grab a copy of Spies, Lies & Cyber crime by Eric O'Neill (not an affiliate link): https://a.co/d/fpkjdI3Chapters00:00 Introduction to Espionage and Cybercrime02:59 The Evolution of Espionage: From Cloak and Dagger to Cyber Attacks06:45 The Case of Robert Hansen: A Deep Dive into Espionage15:56 Writing the Book: Spies, Lies, and Cybercrime19:08 Top Cybersecurity Recommendations for Organizations23:30 The Growing Economy of Cybercrime28:02 Understanding Ransomware: A Case Study31:32 The Tactics of Cybercriminals: Social Engineering and Deepfakes44:09 Mindset Shift: Thinking Like a Spy and Acting Like a HunterGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 21, 2025 • 52min

What Happens in Your BRAIN During Social Engineering Attacks

Question? Text our Studio direct.What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing.  Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 20, 2025 • 53min

LOCKBIT Cyber Crime Takedown Uncovered!

Question? Text our Studio direct.LOCKBIT Cyber Crime Takedown Uncovered!Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT.Chapters00:00 Introduction and Background08:10 Financial Aspects of Ransomware Operations24:33 Technical Skills and Criminal Intent39:46 The Self-Convening Justice System in the Criminal Underground48:31 The Importance of Effective Communication in Cybersecurity Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 18, 2025 • 54min

What Happens When AI Collides with MODERN Warfare?

Question? Text our Studio direct.Join us as we delve into the uncharted territory where artificial intelligence meets modern warfare, exploring the profound implications and potential consequences of this revolutionary intersection. From autonomous drones to predictive analytics, we'll examine how AI is transforming the face of combat and defense strategies. Discover the latest advancements, ethical considerations, and future directions in this fascinating realm where technology and warfare converge. Get ready to uncover the truth about what really happens when AI meets modern warfare, and find out how this synergy is redefining the rules of engagement and the future of global security.We are joined by JL Hancock former lead innovator and Military cryptologist with the U.S.  NAVY SEALs & Special Operations, spent over twenty years in the military and fought in over 100 combat operations. Video episode here: https://youtube.com/live/aZDFCfKR7vA?feature=shareHe was with the first combat group to ever put an AI Drone into Combat.He also has an outstanding book called  The HAWK Enigma.JL shares his story and a side of emerging technology that is rare and one most never get a chance to see.You can grab JL's book too at https://jlhancock.com/Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 16, 2025 • 43min

Spies, Lies & Cybercrime--Treason from Inside The FBI

Question? Text our Studio direct.A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy.The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution of multiple double agents and triggering the worst intelligence breach in U.S. history. 🕵️‍♂️🔥 In this episode, we break down how a 26-year-old undercover FBI operative, Eric O’Neill, helped bring Hanssen down using spycraft, psychological manipulation, and a stolen PalmPilot that became the smoking gun. This real-life espionage case connects directly to modern cybercrime, insider threats, social engineering, and AI-powered deception — proving that trust, not technology, is the ultimate vulnerability.🕵️ This isn’t fiction — it really happened. Robert Hanssen sold America’s secrets for over two decades, sending double agents to their deaths… and a 26-year-old rookie brought him down.👇 Comment below! What shocked you more — the PalmPilot sting, the executions, or how today's cybercriminals use the same tactics?💬 Your take matters. 📚 Get Eric O’Neill’s book & join the conversation. 🔔 Subscribe — new episodes every week uncovering real-world cyber threatsCHAPTERS00:00 – Cold Open: Treason Inside the FBI00:36 – Who Was Robert Hanssen?02:10 – The Human Cost: Executions in Moscow04:45 – Motives: Ego, Power, Immortality06:12 – Enter the Ghost: Eric O’Neill08:01 – Inside the Cage with a Traitor10:22 – The PalmPilot Operation12:18 – The Capture at the Dead Drop13:55 – What the FBI Learned Too Late15:20 – From Spies to Cybercrime17:02 – Why Insider Threat is Still #118:40 – Lessons You Can Use Today19:55 – Final Warning + Upcoming InterviewGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 13, 2025 • 1h

BEHIND SCENES of REAL Data Breach Response

Question? Text our Studio direct.What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.You’ll see how attacks start, how fast they spread, what attackers do once they’re inside your email, and the exact steps that decide whether a company recovers… or collapses.What You’ll Learn: • How a phishing email turns into credential theft and internal compromise • Why Business Email Compromise (BEC) is now the #2 most expensive breach type • The tricks attackers use to hide inside inboxes and impersonate executives • How wire transfer fraud really happens — and how the 2-person rule stops it • What zero-days look like in the wild (and why patches aren’t enough) • The role of MFA, phishing-resistant MFA, email controls, and layered security • Why backups must be immutable, air-gapped, and isolated • How incident response teams contain malware without destroying evidence • When to call cyber insurance, law enforcement, and breach counsel • The IR playbook: detection → containment → communication → forensics → recovery • Why every business — no matter how small — IS a target⌚ CHAPTERS 00:00 – Intro: What BEC Really Looks Like Today 03:42 – How One Email Starts the Attack Chain 11:20 – Why Finance Teams Are Target #1 19:05 – The Social Engineering Playbook 27:48 – Live Breakdown of a Real BEC Incident 38:22 – What Happens During Wire Fraud Recovery 46:10 – Technical Controls That Actually Work 55:36 – HowGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 12, 2025 • 48min

What's The FUTURE of QUANTUM?

Question? Text our Studio direct.Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security.In this conversation, host David Mauro engages with Carlo Tortora Brayda and Michael Tiesemer, leaders of the Cyber Eagle Project, to discuss the future of AI in Cybersecurity and global protection of critical infrastructure.  Chapters 00:00 Introduction to Cyber Eagle Project02:33 The Genesis of Cyber Eagle and Its Vision05:31 Understanding Critical Infrastructure Vulnerabilities08:00 The Age of Compression in Cybersecurity10:42 Building Resilience in Cyber Defense13:44 Dynamic Defense Strategies Against Evolving Threats16:19 Polymorphic AI Defense: Adapting to Attacks19:19 The Future of Cyber Eagle and Its Innovations25:25 Cyber Eagle's Global Deployment Strategy27:56 Building a Compliant Cybersecurity Channel30:40 Innovative Partnerships and Global Reach31:42 Quantum Safety and Cybersecurity Innovations36:58 The Future of Cyber Eagle and Its Mission Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 10, 2025 • 40min

This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach

Question? Text our Studio direct.CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025.Don't miss out on crucial information about the CMMC 2025 deadline. The Cybersecurity Maturity Model Certification is a vital requirement for businesses dealing with the Department of Defense. If you miss the deadline, you risk losing contracts and facing severe penalties. In this video, we'll explore the consequences of missing the CMMC 2025 deadline and provide valuable insights on how to prepare and stay compliant. Stay ahead of the game and ensure your business is CMMC-ready. Find out what happens if you missed the deadline and learn how to avoid costly mistakes. Tune in now and take the first step towards CMMC compliance. CHAPTERS00:00 – The 4 Letters That Can End Your Business00:15 – CMMC 2.0: Why November 10, 2025 Changes Everything01:35 – Meet the Expert: Frontline View from a CMMC Assessor02:59 – What Is CMMC (In Plain English)?04:20 – FCI vs CUI: The Data That Decides Your Level07:05 – Are You Level 1 or Level 2? How the Flow-Down Really Work10:05 – Why the DoD Stopped “Trusting” Small Contractors11:40 – Supply-Chain Breaches: How Third Parties Take You Down13:00 – Level 1: The 17 “Basic” Controls Everyone Ignores17:00 – The Dangerous Game of Fudging Your Self-Attestation21:15 – Level 2: 110 Controls, SSPs, and the Reality of NIST 800-17123:40 – C3PAO Bottleneck: Why Waiting Means Losing Contracts26:30 – POA&M and the 180-Day “Grace” Trap32:05 – Surprise: Printers, MSPs, and “Non-Defense” Vendors in the Blast Radius35:15 – CMMC Is Not Going Away (And Other Hard Truths)37:05 Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 7, 2025 • 37min

What Are The BIGGEST Cyber Security Risks In SaaS Platforms?

Question? Text our Studio direct.What Are The BIGGEST Cyber Security Risks In SaaS Platforms? How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer,  explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps.  Polymer is a data loss prevention platform for Software-as-a-service  platforms.  It leverages AI which automates the protection of sensitive information across SaaS apps like, Salesforce, Google Drive, Slack, Microsoft Teams, and Zoom. We all use these platforms. Did you know there are little known dangers of software as a service platforms?There are many risks. Some intentional  and some created. We explore them today. This is the Story of Start-up CEO and founder Yasir Ali and how he is debunking common cyber security myths about software. TOPICS: hidden cyber security risks in software as a service platforms, innovative ways to reduce risks in software messaging apps, how safe are software as a service platforms, little known dangers of software as a service platforms,new ways to reduce risks in software as a service platforms,TakeawaysAI adoption in SaaS platforms is increasing, and there is a need for AI governance and regulations to address data security concerns.Deepfake technology poses risks to organizations, and Polymer is exploring ways to mitigate these risks.Zero trust architecture and data protection measures are crucial for ensuring the security of sensitive information in SaaS platforms.Chapters01:12 Genesis of Polymer04:11 Data Protection and Control05:37 Risks of Oversharing in SaaS Platforms07:07 Functionality of Polymer08:05 Real-Time RedactioGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/
undefined
Nov 6, 2025 • 46min

Digital Dependence EXPOSED--A Billion Dollar MELTDOWN & AI SECRETS

Question? Text our Studio direct.When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance.We break down: 💥 The $550M AWS outage & how it spread chaos 🧩 Why our phones prove digital dependence is real 🤖 Amazon’s leaked plan to cut 600,000 jobs via automation ⚔️ How AI could redefine modern warfare & national security👉 Subscribe to Cyber Crime Junkies for real stories at the intersection of technology, cybercrime, and survival.Chapters00:00 – Intro: When the Cloud Crashed 02:00 – AWS & Azure Outages Explained05:00-The Impact of Major Service Outages 08:22 – Home vs Work: The Blurred Cyber Lines 14:48 – Automation and the Future of Jobs 18:00 – Amazon’s 600,000 Job Cuts Leak 22:37 – Rise of Artificial Super-Intelligence (ASI) 25:56 – AI as the Next Global Arms Race 28:01 – Cyber Warfare & National Security Risks 31:00 – The Stuxnet Lesson: Cyber Weapons Are Real 34:23 – TikTok, Data Privacy, and Digital Espionage 37:56 – Final Thoughts: The Human Firewall#CyberSecurity #AI #CyberCrimeJunkies #CloudOutage #Automation #DigitalDependence #NationalSecurity #CyberAwareness #AIArmsRaceGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app