From Data Breaches to Deepfakes: A Comprehensive Review of Evolving Cyber Threats and Online Risk Management
Keywords:
Cybersecurity, Data Breaches, Deepfakes, Risk Management, Synthetic MediaAbstract
The cybersecurity landscape has evolved from traditional data breaches to increasingly sophisticated AI-driven threats such as deepfakes, posing complex challenges to individuals, organizations, and national infrastructures. This paper presents a comprehensive review of emerging cyber threats, focusing on the transition from conventional data compromises—such as the MOVEit and Equifax breaches—to the weaponization of synthetic media for fraud, disinformation, and psychological manipulation. Drawing on empirical data and recent case studies, including high-profile incidents involving financial scams, educational sector deepfake bullying, and state-level broadcast intrusions, the study analyzes both the technical execution and human impacts of these attacks. Quantitative assessment highlights rising financial losses, with data breaches incurring $50–$100 million and deepfake scams reaching $26 million per event. The paper proposes a multi-layered risk management framework, integrating AI-powered anomaly detection, decentralized authentication protocols, and cross-sector threat intelligence sharing. It also discusses gaps in current governance and legal frameworks, underscoring the need for harmonized policies and AI literacy across public and private sectors. By synthesizing existing literature, empirical trends, and real-world events, this study offers strategic insights into safeguarding digital ecosystems in the age of hybrid cyber threats.
Downloads
Published
Issue
Section
Most read articles by the same author(s)
- David Adetunji Ademilua, Edoise Areghan, Cloud Computing and Machine Learning for Scalable Predictive Analytics and Automation: A Framework for Solving Real-world Problems , Communication In Physical Sciences: Vol. 12 No. 2 (2025): VOLUME 12 ISSUE 2
- David Adetunji Ademilua, Edoise Areghan, AI-Driven Cloud Security Frameworks: Techniques, Challenges, and Lessons from Case Studies , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
Similar Articles
- Henry Ekene Ohaegbuchu , Boniface Ikechukwu Ijeh, Marry Ihechiluru. Ojiaku, Joint Inversion of Direct Current and Electromagnetic Soundings , Communication In Physical Sciences: Vol. 9 No. 1 (2023): VOLUME 9 ISSUE 1
- M. Runde, Validation of Perception of Some Nigerians on the Origin and Use of Phyto-remedies in Management of Covid 19; An Overview of Social Media Respondents , Communication In Physical Sciences: Vol. 6 No. 1 (2020): VOLUME 6 ISSUE 1
- Usman Mohammed Ibrahim, Agada Livinus Emeka, Impacts of Climate Change on Groundwater Resources in a Semi-Arid Region: A Case Study of Damaturu, Yobe State , Communication In Physical Sciences: Vol. 11 No. 3 (2024): VOLUME 11 ISSUE 3
- Joy Nnenna Okolo, A Review of Machine and Deep Learning Approaches for Enhancing Cybersecurity and Privacy in the Internet of Devices , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Abiodun Rasheed Omokanye, Benefit Onu, A Multi-Source Analysis of Water Supply Challenges in Offa Local Government Area, Kwara State, Nigeria , Communication In Physical Sciences: Vol. 11 No. 2 (2024): VOLUME 11 ISSUE 2
- Aminu Ismaila, Abubakar Sadiq Aliyu, Yakub Viva Ibrahim, Evaluation of Gamma Radiation Dose Level in Mining Sites of Riruwai, Kano, Nigeria , Communication In Physical Sciences: Vol. 8 No. 1 (2022): VOLUME 8 ISSUE 1
- 1. Anthony I. G. Ekedegwa, Evans Ashiegwuike, Enhanced Firefly Algorithm Inspired by Cell Communication Mechanism and Genetic Algorithm for Short-Term Electricity Load Forecasting , Communication In Physical Sciences: Vol. 12 No. 3 (2025): VOLUME 12 ISSUE 3
- Aminu Ismaila, Abubakar Sadiq Aliyu , Yakub Viva Ibrahim, Evaluation of Gamma Radiation Dose Level in Mining Sites of Riruwai, Kano, Nigeria , Communication In Physical Sciences: Vol. 8 No. 1 (2022): VOLUME 8 ISSUE 1
- Michael Oladipo Akinsanya, Aminath Bolaji Bello, Oluwafemi Clement Adeusi, A Comprehensive Review of Edge Computing Approaches for Secure and Efficient Data Processing in IoT Networks , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Joseph Amajama, Ahmed Tunde Ibrahim, Julius Ushie Akwagiobe, Atmospheric Humidity Impact on the Strength of Mobile Phone Communication Signal , Communication In Physical Sciences: Vol. 11 No. 4 (2024): VOLUME 11 ISSUE 4
You may also start an advanced similarity search for this article.