From Data Breaches to Deepfakes: A Comprehensive Review of Evolving Cyber Threats and Online Risk Management
Keywords:
Cybersecurity, Data Breaches, Deepfakes, Risk Management, Synthetic MediaAbstract
The cybersecurity landscape has evolved from traditional data breaches to increasingly sophisticated AI-driven threats such as deepfakes, posing complex challenges to individuals, organizations, and national infrastructures. This paper presents a comprehensive review of emerging cyber threats, focusing on the transition from conventional data compromises—such as the MOVEit and Equifax breaches—to the weaponization of synthetic media for fraud, disinformation, and psychological manipulation. Drawing on empirical data and recent case studies, including high-profile incidents involving financial scams, educational sector deepfake bullying, and state-level broadcast intrusions, the study analyzes both the technical execution and human impacts of these attacks. Quantitative assessment highlights rising financial losses, with data breaches incurring $50–$100 million and deepfake scams reaching $26 million per event. The paper proposes a multi-layered risk management framework, integrating AI-powered anomaly detection, decentralized authentication protocols, and cross-sector threat intelligence sharing. It also discusses gaps in current governance and legal frameworks, underscoring the need for harmonized policies and AI literacy across public and private sectors. By synthesizing existing literature, empirical trends, and real-world events, this study offers strategic insights into safeguarding digital ecosystems in the age of hybrid cyber threats.
Downloads
Published
Issue
Section
Most read articles by the same author(s)
- David Adetunji Ademilua, Edoise Areghan, Cloud Computing and Machine Learning for Scalable Predictive Analytics and Automation: A Framework for Solving Real-world Problems , Communication In Physical Sciences: Vol. 12 No. 2 (2025): VOLUME 12 ISSUE 2
- David Adetunji Ademilua, Edoise Areghan, AI-Driven Cloud Security Frameworks: Techniques, Challenges, and Lessons from Case Studies , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
Similar Articles
- Henrietta Ijeoma Kelle, Maureen Nkemdilim Chukwu, Emily Osa Iduseri, Emeka Chima Ogoko, Rawlings Abem Timothy, Absorption Studies of Some Agricultural Solid Wastes as Biosorbent for the Clean-up of Oil Spill , Communication In Physical Sciences: Vol. 11 No. 4 (2024): VOLUME 11 ISSUE 4
- Joseph Amajama, Julius Ushie Akwagiobe, Efa Ubi Ikpi, Analyzing the Relationship between Atmospheric Pressure and Mobile Network Signal Strength in Southern Nigeria , Communication In Physical Sciences: Vol. 12 No. 4 (2025): VOLUME1 2 ISSUE 4
- Precious Ogechi Ufomba, Ogochukwu Susan Ndibe, IoT and Network Security: Researching Network Intrusion and Security Challenges in Smart Devices , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Uzochukwu Anekwe, Evaluation of Radioactivity Levels in the Federal University Otuoke Laboratories, Bayelsa State, Nigeria. , Communication In Physical Sciences: Vol. 12 No. 6 (2025): VOLUME 12 ISSUE 6
- Bertha Onyenachi Akagbue, Mark Ndako Ibrahim, Oseigbovo Favour Ofure, Oluwaiye Unity Ekugbe, Onah Kyrian, Chibuzor Titus Amaobichukwu, Mu’awiya Baba Aminu, Pam Dajack Dung, Suleiman Isa Babale, Sadiq Mohammed Salisu, Comprehensive Assessment and Remediation Strategies for Air Pollution: Current Trends and Future Prospects; A Case Study in Bompai Industrial Area, Kano State, Nigeria. , Communication In Physical Sciences: Vol. 10 No. 1 (2023): VOLUME 10 ISSUE 1
- Electrical Conductivity Profile of upper mantle in the West African Sub region , Communication In Physical Sciences: Vol. 1 No. 1 (2010): VOLUME 1 ISSUE 1
- Yakubu Mohammed, Habu Tela Abba, Mustapha Suleiman Gimba, Determination of the Gross Alpha and Beta Activity Concentration in Groundwater from Damaturu , Communication In Physical Sciences: Vol. 8 No. 2 (2022): VOLUME 8 ISSUE 2
- Olatunde Ayeomoni, The Use of Supervised and Unsupervised Learning Methods for Detecting Auditing Anomalies , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Vincent Oseikhuemen Binitie, Ogaga Esharive, Solid mineral potential in the southern Benue Trough: A review , Communication In Physical Sciences: Vol. 11 No. 4 (2024): VOLUME 11 ISSUE 4
- Idegwu Abel Daniel, Milam Charles, Usaku Reuben, John Stanley, Joseph Christiana, Spectroscopic Analysis of Some Air Pollutants in Yola North LGA, Adamawa State, Nigeria , Communication In Physical Sciences: Vol. 12 No. 6 (2025): VOLUME 12 ISSUE 6
You may also start an advanced similarity search for this article.



