Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
AI video tool fuels disinformation surge
No-code agentic AI can be used for financial fraud and workflow hijack...
Welcome to the cybercriminal industrial revolution of 2026, where thro...
Singtel Receives Frost & Sullivan’s 2025 Singapore Company o...
Just when we thought AI-powered IDEs were invaluable…
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Web browsers that rank lowest for privacy protection

      Web browsers that rank lowest for privacy protection

      Wednesday, December 10, 2025, 8:30 AM Asia/Singapore | Features, Newsletter
    • Featured

      The impact of APAC’s AI buildout on cybersecurity in 2026

      The impact of APAC’s AI buildout on cybersecurity in 2026

      Tuesday, December 9, 2025, 2:57 PM Asia/Singapore | Features
    • Featured

      Is your AI secretly sabotaging your organization?

      Is your AI secretly sabotaging your organization?

      Monday, December 1, 2025, 4:25 PM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

FeaturesTips

The new face of fraud in the AI era

By Victor Ng | Tuesday, November 25, 2025, 9:57 AM Asia/Singapore

The new face of fraud in the AI era

From evolution to mutation, digital fraud has transformed by leveraging generative AI and deepfake technologies for deep-sea phishing…

Traditional phishing attacks, once identifiable by their clumsy grammar and generic appeals, are evolving into something far more sophisticated and dangerously convincing.

We are entering the era of deep-sea phishing, a new frontier of digital deception where generative AI and deepfakes create a level of realism that can fool even the most discerning eye and ear.

This advanced threat goes beyond simple email scams, deploying hyper-personalized, multi-channel attacks that exploit our most fundamental sense of trust. The digital landscape is shifting beneath our feet, and digital fraud takes on a new dimension.

“The fraud landscape has shifted from an evolution into a mutation, demanding that we both shift and move even faster to stay ahead,” commented Ian Holmes, Global Lead for Enterprise Fraud Solutions, Director, SAS.

30 years on from the first AOL phishing email, fraud today is less about crude digital trickery and more about AI-enabled fraud threats in a highly effective enterprise underworld.

“The latest frontier – deep-sea phishing – fuses deepfake video and audio, created by Generative AI, to deceive victims with alarming realism; the barrier to entry has never been lower, and the manipulation more precise,” warned Holmes. 

Thriving on VUCA in the AI era
“Fraud thrives in uncertainty, and today’s mix of economic volatility, rapid digitalization, and AI acceleration has created the perfect storm,” he added. “Every channel, from social media to video conferencing, can now be weaponized.”

According to KPMG’s Global Banking Scam Survey 2025, 91% of banks rate real-time transaction pausing or blocking as effective. “But how long can this customer impediment to fast money last?” Holmes asked rhetorically.

Additionally, 79% cite access to centralized mule-account data across institutions as key to detection, which needs industry collaboration. “Astoundingly, only 15% say they are currently leveraging advanced analytics and machine learning at scale – a widening gap in AI capability compared to the nimbleness of the threat actors working against them.”

Effective fraud management
Holmes proffered a path ahead for managing fraud more effectively: “Effective fraud prevention today, then, is even more about prediction than it has ever been. No longer can reaction be accepted. Advanced analytics and AI now make real-time scoring of transactions along with synchronous decision response to act upon these insights, and detect anomalies as they emerge.” 

The path forward, he said, lies in predictive intelligence, mapping behavior, linking networks, and as a final stage, identifying mule networks before the money moves.

What next? “The next frontier is collaboration built on shared insight,” he continued. “As organizations connect data across departments and industries, intelligence will transform into foresight. In this new era, data itself becomes defense, the unifying frontline against fraud’s relentless evolution.”

Practical steps to take today

  1. Adopt a “zero-trust” mindset: Be inherently skeptical of unsolicited messages. Don’t click links or open attachments from unknown senders.
  2. Verify through alternate channels: If an email from your “boss” or “bank” asks for something unusual, call them on a known, official number to confirm.
  3. Use strong, unique passwords and a password manager: This prevents one breached account from compromising others.
  4. Enable multi-factor authentication (MFA): This is the single most effective way to protect accounts, even if a password is stolen.
  5. Keep software updated: This includes OS, browser, and all applications to patch security vulnerabilities.
  6. Security awareness training: Regularly train and test employees with simulated phishing attacks. Make cybersecurity part of the company culture.
  7. Network segmentation: Limit the damage if an attacker gains a foothold by ensuring they can’t easily access critical systems.
  8. Endpoint detection and response (EDR): Use tools that can detect and respond to malicious activity on devices after a phishing link is clicked.
  9. Threat intelligence: Subscribe to services that provide information on new phishing campaigns and tactics, often sourced from the dark web.

Share:

PreviousShadow AI – the hidden risk in APAC organizations
NextBuilding human centric defences in the age of AI

Related Posts

Latest Patch Tuesday rings alarm bells for 240m or more Windows users

Latest Patch Tuesday rings alarm bells for 240m or more Windows users

Friday, March 14, 2025

Four cyber threats expected to get even more worrisome next year

Four cyber threats expected to get even more worrisome next year

Wednesday, November 29, 2023

Pit your wits in the first ever FIDO global developer challenge

Pit your wits in the first ever FIDO global developer challenge

Wednesday, June 16, 2021

Why spear phish a CEO when you can attack a sales manager?

Why spear phish a CEO when you can attack a sales manager?

Thursday, August 5, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keeps members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keeps members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more
  • Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    An improved dual-liveness biometric framework can counter more deepfake threats, ensure compliance, and protect underbanked …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.