Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Is secure issuance a solved problem, or is the debate more complex?
Android 17 Beta Now Available for vivo X300 Pro and iQOO 15
SU Group Wins New Government Contract; Continues Expansion
Why AI Still Needs the Hacker’s Mind: DEVCORE Pwns Four Microsof...
Linux security list being overwhelmed by duplicate AI bug reports
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Is secure issuance a solved problem, or is the debate more complex?

      Is secure issuance a solved problem, or is the debate more complex?

      Thursday, May 21, 2026, 3:11 PM Asia/Singapore | Features
    • Featured

      Cyber risk, fraud, and CX: Why banks can’t treat them separately anymore

      Cyber risk, fraud, and CX: Why banks can’t treat them separately anymore

      Wednesday, May 20, 2026, 9:34 AM Asia/Singapore | Features
    • Featured

      Agentic RAG: Key to turning APAC’s AI pilots into profits?

      Agentic RAG: Key to turning APAC’s AI pilots into profits?

      Tuesday, May 19, 2026, 2:15 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • AWARDS 2026
  • Directory
  • E-Learning

Select Page

News

Deepfake job applicant nearly fools AI‑security CEO in hiring interview

By CybersecAsia editors | Thursday, February 5, 2026, 11:54 AM Asia/Singapore

Deepfake job applicant nearly fools AI‑security CEO in hiring interview

A security‑focused executive nearly hires a synthetic candidate during a video interview, exposing how realistic fraud can evade even expert scrutiny.

An AI‑security startup CEO, with years of experience as a CISO and deepfake researcher, thought he was safe from the kind of scams he often warns others about — until a deepfake job candidate almost slipped through his own hiring process, according to TheRegister.

Jason Rebholz, CEO, Evoke Security, had recently posted openings for security‑research roles on LinkedIn, and within hours a stranger messaged him saying he knew a strong candidate for the position.

The would‑be applicant’s profile picture looked like an anime character rather than a real person (the first red flag of a scam), but Rebholz still gave the candidate the benefit of the doubt because the résumé appeared polished and professional.

Subsequently the intermediary claimed the candidate in question had worked overseas and previously collaborated with them at a San Francisco‑based company, a detail that struck Rebholz as odd but not impossible for a remote‑first startup. After exchanging emails, the candidate appeared on a video call using a virtual background; his face looked slightly blurred and “plastic”, with telltale greenscreen reflections in his glasses and dimples that flickered in and out as he moved.

Rebholz later described feeling “95% sure” he was talking to a deepfake, yet he hesitated to call it out, worrying he might unfairly reject a real person who simply looked unusual on camera.

During the interview, the candidate repeatedly echoed Rebholz’s own public statements and even parroted his questions back before answering, creating an eerie sense that Rebholz was essentially talking to himself. He later learned that the applicant was likely part of a broader North Korean‑linked job‑scam network that uses fake IT profiles to infiltrate companies, steal code, and funnel salaries back to fund weapons programs.

In the end, Rebholz did not terminate the interview on the spot but later confirmed with deepfake‑detection tools that the video was synthetic — underscoring how even seasoned security leaders can be psychologically disarmed by the fear of misjudging a human candidate.

Share:

PreviousICAC Commissioner attends APEC anti-corruption meetings in Guangzhou to foster collaborations in the Asia Pacific region
NextShield AI, Republic of Singapore Air Force, and Defence Science and Technology Agency Expand Partnership to Progressively Field Autonomy Capabilities

Related Posts

Large language models have their strengths and weaknesses: analysis

Large language models have their strengths and weaknesses: analysis

Monday, April 22, 2024

Watch out for critical class bugs in 2021

Watch out for critical class bugs in 2021

Monday, January 4, 2021

Calling mobile app developers: watch out for misconfigured third-party data sources!

Calling mobile app developers: watch out for misconfigured third-party data sources!

Wednesday, June 9, 2021

Take note: fraudsters are digitalizing faster than the FI industry!

Take note: fraudsters are digitalizing faster than the FI industry!

Wednesday, February 15, 2023

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • How a Vietnamese D2C retailer built its own secure digital infrastructure

    How a Vietnamese D2C retailer built its own secure digital infrastructure

    Would your organization build your own digital infrastructure – including AI governance and cybersecurity – …Read more
  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more

Bottom sidebar

Other News

  • Android 17 Beta Now Available for vivo X300 Pro and iQOO 15

    Thursday, May 21, 2026
    SHENZHEN, China, May 20, 2026 …Read More »
  • SU Group Wins New Government Contract; Continues Expansion

    Wednesday, May 20, 2026
    HONG KONG, May 20, 2026 …Read More »
  • Why AI Still Needs the Hacker’s Mind: DEVCORE Pwns Four Microsoft Products to Win Pwn2Own Berlin 2026

    Wednesday, May 20, 2026
    TAIPEI, May 20, 2026 /PRNewswire/ …Read More »
  • Aitech Awarded $63M Contract for Avionics Computing Solutions to Power India’s Light Combat Helicopter Program

    Wednesday, May 20, 2026
    Hindustan Aeronautics Limited Selected Aitech …Read More »
  • Cohesity Earns AWS Resilience Competency, Advancing Enterprise Cyber Recovery

    Wednesday, May 20, 2026
    Strengthens global cyber resilience and …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.