Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Defense industrial bases face evolving cyber threats in 2026: analysis
With AI powering seasonal e-shopping fraud and scams, what can CISOs d...
Digital gold for predators on Valentine’s Day
Should we worry about AI agents taking over our world?
Ransomware group exposed as a fake-breach scam operation
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Where are financial fraud and AML regulations heading in S E Asia?

      Where are financial fraud and AML regulations heading in S E Asia?

      Tuesday, February 10, 2026, 2:44 PM Asia/Singapore | Features
    • Featured

      How AI is reshaping dating in Asia

      How AI is reshaping dating in Asia

      Monday, February 9, 2026, 5:33 AM Asia/Singapore | Features, Newsletter
    • Featured

      Emerging third-party cyber risks via agentic AI

      Emerging third-party cyber risks via agentic AI

      Tuesday, February 3, 2026, 10:22 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

FeaturesTips

The new face of fraud in the AI era

By Victor Ng | Tuesday, November 25, 2025, 9:57 AM Asia/Singapore

The new face of fraud in the AI era

From evolution to mutation, digital fraud has transformed by leveraging generative AI and deepfake technologies for deep-sea phishing…

Traditional phishing attacks, once identifiable by their clumsy grammar and generic appeals, are evolving into something far more sophisticated and dangerously convincing.

We are entering the era of deep-sea phishing, a new frontier of digital deception where generative AI and deepfakes create a level of realism that can fool even the most discerning eye and ear.

This advanced threat goes beyond simple email scams, deploying hyper-personalized, multi-channel attacks that exploit our most fundamental sense of trust. The digital landscape is shifting beneath our feet, and digital fraud takes on a new dimension.

“The fraud landscape has shifted from an evolution into a mutation, demanding that we both shift and move even faster to stay ahead,” commented Ian Holmes, Global Lead for Enterprise Fraud Solutions, Director, SAS.

30 years on from the first AOL phishing email, fraud today is less about crude digital trickery and more about AI-enabled fraud threats in a highly effective enterprise underworld.

“The latest frontier – deep-sea phishing – fuses deepfake video and audio, created by Generative AI, to deceive victims with alarming realism; the barrier to entry has never been lower, and the manipulation more precise,” warned Holmes. 

Thriving on VUCA in the AI era
“Fraud thrives in uncertainty, and today’s mix of economic volatility, rapid digitalization, and AI acceleration has created the perfect storm,” he added. “Every channel, from social media to video conferencing, can now be weaponized.”

According to KPMG’s Global Banking Scam Survey 2025, 91% of banks rate real-time transaction pausing or blocking as effective. “But how long can this customer impediment to fast money last?” Holmes asked rhetorically.

Additionally, 79% cite access to centralized mule-account data across institutions as key to detection, which needs industry collaboration. “Astoundingly, only 15% say they are currently leveraging advanced analytics and machine learning at scale – a widening gap in AI capability compared to the nimbleness of the threat actors working against them.”

Effective fraud management
Holmes proffered a path ahead for managing fraud more effectively: “Effective fraud prevention today, then, is even more about prediction than it has ever been. No longer can reaction be accepted. Advanced analytics and AI now make real-time scoring of transactions along with synchronous decision response to act upon these insights, and detect anomalies as they emerge.” 

The path forward, he said, lies in predictive intelligence, mapping behavior, linking networks, and as a final stage, identifying mule networks before the money moves.

What next? “The next frontier is collaboration built on shared insight,” he continued. “As organizations connect data across departments and industries, intelligence will transform into foresight. In this new era, data itself becomes defense, the unifying frontline against fraud’s relentless evolution.”

Practical steps to take today

  1. Adopt a “zero-trust” mindset: Be inherently skeptical of unsolicited messages. Don’t click links or open attachments from unknown senders.
  2. Verify through alternate channels: If an email from your “boss” or “bank” asks for something unusual, call them on a known, official number to confirm.
  3. Use strong, unique passwords and a password manager: This prevents one breached account from compromising others.
  4. Enable multi-factor authentication (MFA): This is the single most effective way to protect accounts, even if a password is stolen.
  5. Keep software updated: This includes OS, browser, and all applications to patch security vulnerabilities.
  6. Security awareness training: Regularly train and test employees with simulated phishing attacks. Make cybersecurity part of the company culture.
  7. Network segmentation: Limit the damage if an attacker gains a foothold by ensuring they can’t easily access critical systems.
  8. Endpoint detection and response (EDR): Use tools that can detect and respond to malicious activity on devices after a phishing link is clicked.
  9. Threat intelligence: Subscribe to services that provide information on new phishing campaigns and tactics, often sourced from the dark web.

Share:

PreviousShadow AI – the hidden risk in APAC organizations
NextBuilding human centric defences in the age of AI

Related Posts

Mitigating fraud and identity risk without impairing customer experience

Mitigating fraud and identity risk without impairing customer experience

Friday, April 8, 2022

Advanced persistent threat actors behind Sunburst attack may be back as Tomiris

Advanced persistent threat actors behind Sunburst attack may be back as Tomiris

Friday, October 1, 2021

Fatal digitalization myth: your cloud vendor is responsible for your cybersecurity

Fatal digitalization myth: your cloud vendor is responsible for your cybersecurity

Friday, April 30, 2021

2021 Global Incident Response Threat Report

2021 Global Incident Response Threat Report

Wednesday, August 11, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more

Bottom sidebar

Other News

  • Blackpanda Japan Announces Strategic Partnership with SoftBank to Strengthen Cyber Incident Response in Japan

    Wednesday, February 11, 2026
    SINGAPORE, Feb. 10, 2026 /PRNewswire/ …Read More »
  • Cohesity Collaborates with Google Cloud to Deliver Secure Sandbox Capabilities and Comprehensive Threat Insights Designed to Eliminate Hidden Malware

    Saturday, February 7, 2026
    Embedded Google Threat Intelligence capabilities, …Read More »
  • Shield AI, Republic of Singapore Air Force, and Defence Science and Technology Agency Expand Partnership to Progressively Field Autonomy Capabilities

    Thursday, February 5, 2026
    SINGAPORE, Feb. 5, 2026 /PRNewswire/ …Read More »
  • ICAC Commissioner attends APEC anti-corruption meetings in Guangzhou to foster collaborations in the Asia Pacific region

    Thursday, February 5, 2026
    HONG KONG, Feb. 4, 2026 …Read More »
  • VIVOTEK Enhances VORTEX with Generative AI and Safety Detection

    Tuesday, February 3, 2026
    Expanding the cloud security ecosystem …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.