From Data Breaches to Deepfakes: A Comprehensive Review of Evolving Cyber Threats and Online Risk Management
Keywords:
Cybersecurity, Data Breaches, Deepfakes, Risk Management, Synthetic MediaAbstract
The cybersecurity landscape has evolved from traditional data breaches to increasingly sophisticated AI-driven threats such as deepfakes, posing complex challenges to individuals, organizations, and national infrastructures. This paper presents a comprehensive review of emerging cyber threats, focusing on the transition from conventional data compromises—such as the MOVEit and Equifax breaches—to the weaponization of synthetic media for fraud, disinformation, and psychological manipulation. Drawing on empirical data and recent case studies, including high-profile incidents involving financial scams, educational sector deepfake bullying, and state-level broadcast intrusions, the study analyzes both the technical execution and human impacts of these attacks. Quantitative assessment highlights rising financial losses, with data breaches incurring $50–$100 million and deepfake scams reaching $26 million per event. The paper proposes a multi-layered risk management framework, integrating AI-powered anomaly detection, decentralized authentication protocols, and cross-sector threat intelligence sharing. It also discusses gaps in current governance and legal frameworks, underscoring the need for harmonized policies and AI literacy across public and private sectors. By synthesizing existing literature, empirical trends, and real-world events, this study offers strategic insights into safeguarding digital ecosystems in the age of hybrid cyber threats.
Downloads
Published
Issue
Section
Most read articles by the same author(s)
- David Adetunji Ademilua, Edoise Areghan, Cloud Computing and Machine Learning for Scalable Predictive Analytics and Automation: A Framework for Solving Real-world Problems , Communication In Physical Sciences: Vol. 12 No. 2 (2025): VOLUME 12 ISSUE 2
- David Adetunji Ademilua, Edoise Areghan, AI-Driven Cloud Security Frameworks: Techniques, Challenges, and Lessons from Case Studies , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
Similar Articles
- Joseph Istipanus Abaleni, Anas Muhammad Salisu, Jamilu Abdullahi Yusuf, Tukur Yakubu Muhammed , Assessment of Entrance Surface Dose and Effective Dose in Intravenous Urography (IVU) Procedure in Selected Hospitals in Yobe State, Nigeria , Communication In Physical Sciences: Vol. 13 No. 1 (2026): VOLUME 13 ISSUE 1
- Temitope Sunday Adeusi, Ayodeji Aregbesola, Impact of Climatic Condition on the Life Cycle of Water Contaminants , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Oluwatosin Lawal, Projecting AI-Driven Intersection of FinTech, Financial Compliance, and Technology Law , Communication In Physical Sciences: Vol. 12 No. 2 (2025): VOLUME 12 ISSUE 2
- Michael Oladipo Akinsanya, Oluwafemi Clement Adeusi, Kazeem Bamidele Ajanaku, A Detailed Review of Contemporary Cyber/Network Security Approaches and Emerging Challenges , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Imam Akintomiwa Akinlade, Ahmed Olasunkanmi Tijani, Musili Adeyemi Adebayo, Chiamaka Perpetua Ezenwaka, Toluwalase Damilola Osanyingbemi, Precious Mkpouto Akpan, Evaluating the Impact of Integrated Go-to-Market Systems on U.S. SMB Competitiveness , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Dezzline Ondigo, Dr. Ann G. Ngari , Essential Oils from East African Ocimum Species as Potential Sources of Fragrances for Cosmetic Applications: A Review , Communication In Physical Sciences: Vol. 13 No. 3 (2026): Volume 13 Issue 3
- Atim Sunday Johnson, Idongesit Bassey Anweting, Idongesit Edem Okon, Electron Transfer Reactions of Tetrakis (2, 2- Bipyridine)-µ Oxodiiron(III) Complex and Dithionate Ion in Aqueous Acidic Media: Kinetic and Mechanistic Approach , Communication In Physical Sciences: Vol. 10 No. 1 (2023): VOLUME 10 ISSUE 1
- Iniofon Udom, Grace Cookery, Paul Ocheje Ameh, Investigation of Acanthus montanus Leaves Extract as Corrosion Inhibitor for Copper in 2 M Sulphuric Acid , Communication In Physical Sciences: Vol. 12 No. 3 (2025): VOLUME 12 ISSUE 3
- Edith Agberxonu, Abdulateef Disu, Chidin Dike, Toyosi Mustapha, Lawrence Abakah, Machine Learning and Artificial Intelligence in FinTech: Driving Innovation in Digital Payments, Fraud Detection, and Financial Inclusion , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- 1. Anthony I. G. Ekedegwa, Evans Ashiegwuike, Abdullahi Mohammed S. B, Seasonal Short-Term Load Forecasting (STLF) using combined Social Spider Optimisation (SSO) and African Vulture Optimisation Algorithm (AVOA) in Artificial Neural Networks (ANN) , Communication In Physical Sciences: Vol. 12 No. 3 (2025): VOLUME 12 ISSUE 3
You may also start an advanced similarity search for this article.



