Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Deepfake job applicant nearly fools AI‑security CEO in hiring intervie...
ICAC Commissioner attends APEC anti-corruption meetings in Guangzhou t...
AI‑agent social network exposes millions of credentials and emails
VIVOTEK Enhances VORTEX with Generative AI and Safety Detection
Android spyware campaign exploits AI platform and accessibility servic...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Emerging third-party cyber risks via agentic AI

      Emerging third-party cyber risks via agentic AI

      Tuesday, February 3, 2026, 10:22 AM Asia/Singapore | Features
    • Featured

      Rethinking customer identity for financial cybersecurity

      Rethinking customer identity for financial cybersecurity

      Tuesday, January 27, 2026, 4:13 PM Asia/Singapore | Features
    • Featured

      How AI is supercharging state-sponsored threat actors in Asia Pacific

      How AI is supercharging state-sponsored threat actors in Asia Pacific

      Wednesday, January 14, 2026, 4:06 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

News

Deepfake job applicant nearly fools AI‑security CEO in hiring interview

By CybersecAsia editors | Thursday, February 5, 2026, 11:54 AM Asia/Singapore

Deepfake job applicant nearly fools AI‑security CEO in hiring interview

A security‑focused executive nearly hires a synthetic candidate during a video interview, exposing how realistic fraud can evade even expert scrutiny.

An AI‑security startup CEO, with years of experience as a CISO and deepfake researcher, thought he was safe from the kind of scams he often warns others about — until a deepfake job candidate almost slipped through his own hiring process, according to TheRegister.

Jason Rebholz, CEO, Evoke Security, had recently posted openings for security‑research roles on LinkedIn, and within hours a stranger messaged him saying he knew a strong candidate for the position.

The would‑be applicant’s profile picture looked like an anime character rather than a real person (the first red flag of a scam), but Rebholz still gave the candidate the benefit of the doubt because the résumé appeared polished and professional.

Subsequently the intermediary claimed the candidate in question had worked overseas and previously collaborated with them at a San Francisco‑based company, a detail that struck Rebholz as odd but not impossible for a remote‑first startup. After exchanging emails, the candidate appeared on a video call using a virtual background; his face looked slightly blurred and “plastic”, with telltale greenscreen reflections in his glasses and dimples that flickered in and out as he moved.

Rebholz later described feeling “95% sure” he was talking to a deepfake, yet he hesitated to call it out, worrying he might unfairly reject a real person who simply looked unusual on camera.

During the interview, the candidate repeatedly echoed Rebholz’s own public statements and even parroted his questions back before answering, creating an eerie sense that Rebholz was essentially talking to himself. He later learned that the applicant was likely part of a broader North Korean‑linked job‑scam network that uses fake IT profiles to infiltrate companies, steal code, and funnel salaries back to fund weapons programs.

In the end, Rebholz did not terminate the interview on the spot but later confirmed with deepfake‑detection tools that the video was synthetic — underscoring how even seasoned security leaders can be psychologically disarmed by the fear of misjudging a human candidate.

Share:

PreviousICAC Commissioner attends APEC anti-corruption meetings in Guangzhou to foster collaborations in the Asia Pacific region

Related Posts

APAC hardest hit by ransomware to the tune of US$1.18m

APAC hardest hit by ransomware to the tune of US$1.18m

Friday, November 20, 2020

Guess which messaging platform was used most for phishing campaigns

Guess which messaging platform was used most for phishing campaigns

Friday, July 16, 2021

Could these four international DX megatrends impact SMEs in Asia?

Could these four international DX megatrends impact SMEs in Asia?

Thursday, June 3, 2021

Investigative journalism opens up Pandora’s Box for the rich and powerful

Investigative journalism opens up Pandora’s Box for the rich and powerful

Tuesday, October 5, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more

Bottom sidebar

Other News

  • ICAC Commissioner attends APEC anti-corruption meetings in Guangzhou to foster collaborations in the Asia Pacific region

    Thursday, February 5, 2026
    HONG KONG, Feb. 4, 2026 …Read More »
  • VIVOTEK Enhances VORTEX with Generative AI and Safety Detection

    Tuesday, February 3, 2026
    Expanding the cloud security ecosystem …Read More »
  • Fraud Syndicates Now Operate Like Businesses: VIDA Urges Malaysian CISOs to Rethink AI-Era Defense

    Tuesday, February 3, 2026
    KUALA LUMPUR, Malaysia, Feb. 2, …Read More »
  • Baseus Security Brings Kickstarter Success X1 Pro Smart AI Dual-Tracking Security Camera to Amazon

    Tuesday, February 3, 2026
    SHENZHEN, China, Feb. 3, 2026 …Read More »
  • SECOM Singapore Receives Frost & Sullivan’s 2025 Singapore Customer Value Leadership Recognition in the Integrated Security Services Industry

    Monday, February 2, 2026
    The company is recognized for …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.