Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Shorter TLS certificate lifespans raise renewal challenges for stretch...
AI coding tool flaw could silently execute malicious commands, steal A...
2025 telemetry found 90% of ransomware incidents had exploited firewal...
Kingsoft Cloud Announces Unaudited Fourth Quarter and Fiscal Year 2025...
Iran-linked cyberattack hits major US medical device maker’s global op...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Agentic AI: The next great productivity hack or the ultimate security nightmare of 2026?

      Agentic AI: The next great productivity hack or the ultimate security nightmare of 2026?

      Wednesday, March 18, 2026, 3:00 PM Asia/Singapore | Features, Newsletter
    • Featured

      Misconfigured AI: Hype or real threat to APAC Infrastructure?

      Misconfigured AI: Hype or real threat to APAC Infrastructure?

      Monday, March 16, 2026, 7:36 PM Asia/Singapore | Features, Tips
    • Featured

      Building trust in Asia’s financial sector with digital identity innovations

      Building trust in Asia’s financial sector with digital identity innovations

      Monday, March 16, 2026, 9:45 AM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

FeaturesTips

The new face of fraud in the AI era

By Victor Ng | Tuesday, November 25, 2025, 9:57 AM Asia/Singapore

The new face of fraud in the AI era

From evolution to mutation, digital fraud has transformed by leveraging generative AI and deepfake technologies for deep-sea phishing…

Traditional phishing attacks, once identifiable by their clumsy grammar and generic appeals, are evolving into something far more sophisticated and dangerously convincing.

We are entering the era of deep-sea phishing, a new frontier of digital deception where generative AI and deepfakes create a level of realism that can fool even the most discerning eye and ear.

This advanced threat goes beyond simple email scams, deploying hyper-personalized, multi-channel attacks that exploit our most fundamental sense of trust. The digital landscape is shifting beneath our feet, and digital fraud takes on a new dimension.

“The fraud landscape has shifted from an evolution into a mutation, demanding that we both shift and move even faster to stay ahead,” commented Ian Holmes, Global Lead for Enterprise Fraud Solutions, Director, SAS.

30 years on from the first AOL phishing email, fraud today is less about crude digital trickery and more about AI-enabled fraud threats in a highly effective enterprise underworld.

“The latest frontier – deep-sea phishing – fuses deepfake video and audio, created by Generative AI, to deceive victims with alarming realism; the barrier to entry has never been lower, and the manipulation more precise,” warned Holmes. 

Thriving on VUCA in the AI era
“Fraud thrives in uncertainty, and today’s mix of economic volatility, rapid digitalization, and AI acceleration has created the perfect storm,” he added. “Every channel, from social media to video conferencing, can now be weaponized.”

According to KPMG’s Global Banking Scam Survey 2025, 91% of banks rate real-time transaction pausing or blocking as effective. “But how long can this customer impediment to fast money last?” Holmes asked rhetorically.

Additionally, 79% cite access to centralized mule-account data across institutions as key to detection, which needs industry collaboration. “Astoundingly, only 15% say they are currently leveraging advanced analytics and machine learning at scale – a widening gap in AI capability compared to the nimbleness of the threat actors working against them.”

Effective fraud management
Holmes proffered a path ahead for managing fraud more effectively: “Effective fraud prevention today, then, is even more about prediction than it has ever been. No longer can reaction be accepted. Advanced analytics and AI now make real-time scoring of transactions along with synchronous decision response to act upon these insights, and detect anomalies as they emerge.” 

The path forward, he said, lies in predictive intelligence, mapping behavior, linking networks, and as a final stage, identifying mule networks before the money moves.

What next? “The next frontier is collaboration built on shared insight,” he continued. “As organizations connect data across departments and industries, intelligence will transform into foresight. In this new era, data itself becomes defense, the unifying frontline against fraud’s relentless evolution.”

Practical steps to take today

  1. Adopt a “zero-trust” mindset: Be inherently skeptical of unsolicited messages. Don’t click links or open attachments from unknown senders.
  2. Verify through alternate channels: If an email from your “boss” or “bank” asks for something unusual, call them on a known, official number to confirm.
  3. Use strong, unique passwords and a password manager: This prevents one breached account from compromising others.
  4. Enable multi-factor authentication (MFA): This is the single most effective way to protect accounts, even if a password is stolen.
  5. Keep software updated: This includes OS, browser, and all applications to patch security vulnerabilities.
  6. Security awareness training: Regularly train and test employees with simulated phishing attacks. Make cybersecurity part of the company culture.
  7. Network segmentation: Limit the damage if an attacker gains a foothold by ensuring they can’t easily access critical systems.
  8. Endpoint detection and response (EDR): Use tools that can detect and respond to malicious activity on devices after a phishing link is clicked.
  9. Threat intelligence: Subscribe to services that provide information on new phishing campaigns and tactics, often sourced from the dark web.

Share:

PreviousShadow AI – the hidden risk in APAC organizations
NextBuilding human centric defences in the age of AI

Related Posts

Continued pandemic increases complexity of networks, risks: study

Continued pandemic increases complexity of networks, risks: study

Tuesday, October 19, 2021

Will you be a prey on Valentine’s Day?

Will you be a prey on Valentine’s Day?

Monday, February 12, 2024

How are large operational technology organizations worldwide increasing cyber oversight?

How are large operational technology organizations worldwide increasing cyber oversight?

Tuesday, July 22, 2025

How two threat groups have been orchestrating large-scale scams

How two threat groups have been orchestrating large-scale scams

Monday, May 5, 2025

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • Kingsoft Cloud Announces Unaudited Fourth Quarter and Fiscal Year 2025 Financial Results

    Wednesday, March 25, 2026
    BEIJING, March 25, 2026 /PRNewswire/ …Read More »
  • Inspira Enterprise Joins the Microsoft Intelligent Security Association

    Wednesday, March 25, 2026
    MUMBAI, India, March 24, 2026 …Read More »
  • Athena Intelligence Launches India Push Amid Rising Cross-Border Corporate Risk

    Tuesday, March 24, 2026
    Aditya Jain appointed to lead …Read More »
  • Global Technology Leaders to Convene at ATxEnterprise 2026 to Address the Future of Digital Infrastructure, AI, and Cyber Trust

    Tuesday, March 24, 2026
    SINGAPORE, March 24, 2026 /PRNewswire/ …Read More »
  • Guidebook download: Streamlining video surveillance projects with Hikvision’s Hik-Partner Pro Designer

    Tuesday, March 24, 2026
    HANGZHOU, China, March 24, 2026 …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.