Artwork

Вміст надано Cyber Crime Junkies. Host David Mauro.. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Cyber Crime Junkies. Host David Mauro. або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

BEHIND SCENES of REAL Data Breach Response

1:01:53
 
Поширити
 

Manage episode 519306382 series 3559123
Вміст надано Cyber Crime Junkies. Host David Mauro.. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Cyber Crime Junkies. Host David Mauro. або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

Question? Text our Studio direct.

What really happens during a cyber attack?
Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.

In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.

You’ll see how attacks start, how fast they spread, what attackers do once they’re inside your email, and the exact steps that decide whether a company recovers… or collapses.

What You’ll Learn:
• How a phishing email turns into credential theft and internal compromise
• Why Business Email Compromise (BEC) is now the #2 most expensive breach type
• The tricks attackers use to hide inside inboxes and impersonate executives
• How wire transfer fraud really happens — and how the 2-person rule stops it
• What zero-days look like in the wild (and why patches aren’t enough)
• The role of MFA, phishing-resistant MFA, email controls, and layered security
• Why backups must be immutable, air-gapped, and isolated
• How incident response teams contain malware without destroying evidence
• When to call cyber insurance, law enforcement, and breach counsel
• The IR playbook: detection → containment → communication → forensics → recovery
• Why every business — no matter how small — IS a

Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos:

🔥 Interviews with spies & double agents 💥 Cyber WTF moments 🎮 New interactive segments & games 🛡️ Business-grade cybersecurity insights 😂 More humor, more banter, more chaos

Hit SUBSCRIBE

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Support the show

🔥New Exclusive Offers for Cyber Crime Junkies! 🔥

1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies
2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring
🔥Sign up here and Get 20% off DELETE ME
3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq

Dive Deeper:
🔗 Website: https://cybercrimejunkies.com

✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/

=====================================================

  continue reading

284 епізодів

Artwork
iconПоширити
 
Manage episode 519306382 series 3559123
Вміст надано Cyber Crime Junkies. Host David Mauro.. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Cyber Crime Junkies. Host David Mauro. або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

Question? Text our Studio direct.

What really happens during a cyber attack?
Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.

In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.

You’ll see how attacks start, how fast they spread, what attackers do once they’re inside your email, and the exact steps that decide whether a company recovers… or collapses.

What You’ll Learn:
• How a phishing email turns into credential theft and internal compromise
• Why Business Email Compromise (BEC) is now the #2 most expensive breach type
• The tricks attackers use to hide inside inboxes and impersonate executives
• How wire transfer fraud really happens — and how the 2-person rule stops it
• What zero-days look like in the wild (and why patches aren’t enough)
• The role of MFA, phishing-resistant MFA, email controls, and layered security
• Why backups must be immutable, air-gapped, and isolated
• How incident response teams contain malware without destroying evidence
• When to call cyber insurance, law enforcement, and breach counsel
• The IR playbook: detection → containment → communication → forensics → recovery
• Why every business — no matter how small — IS a

Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos:

🔥 Interviews with spies & double agents 💥 Cyber WTF moments 🎮 New interactive segments & games 🛡️ Business-grade cybersecurity insights 😂 More humor, more banter, more chaos

Hit SUBSCRIBE

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Support the show

🔥New Exclusive Offers for Cyber Crime Junkies! 🔥

1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies
2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring
🔥Sign up here and Get 20% off DELETE ME
3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq

Dive Deeper:
🔗 Website: https://cybercrimejunkies.com

✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/

=====================================================

  continue reading

284 епізодів

所有剧集

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник

Слухайте це шоу, досліджуючи
Відтворити