Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Phishing»Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
    Phishing

    Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort

    By Concetta Law, FCRH '27August 5, 20252 Mins Read
    A picture of a woman placing her face on a model.
    Example of deep fake via deepfakemaker.io
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    As deepfake technology becomes more advanced and accessible, it poses a growing threat to cybersecurity, particularly in the form of disinformation, social engineering, and phishing attacks. In response to this evolving risk landscape, several authoritative organizations have released guidance and resources to help understand and mitigate these threats.

    NSA, FBI, and CISA Joint Cybersecurity Information Sheet (CSI) on Deepfake Threats

    Released on September 12, 2023, this alert introduces a joint publication by the NSA, FBI, and CISA titled “Contextualizing Deepfake Threats to Organizations”.
    The official PDF document outlines the risks associated with synthetic media, including how malicious actors may use deepfakes for:

    • Impersonating executives in video or audio calls
    • Influencing public opinion and trust
    • Manipulating or fabricating evidence
    • Enabling sophisticated social engineering or phishing attacks

    The guide encourages organizations to adopt a proactive approach by enhancing media authentication processes, promoting user awareness, and incorporating deepfake detection capabilities into their cybersecurity strategies.

    University of Florida’s Deepfake Phishing Awareness

    The University of Florida’s IT Security Office expands on the concept by providing educational resources on how deepfakes are used in phishing. It emphasizes the growing risk of attackers using voice and video impersonation in business email compromise (BEC) and similar scams. The page offers practical steps to recognize potential deepfake-based phishing attempts, including:

    • Being cautious with urgent or unusual voice/video messages
    • Verifying identities through multiple channels
    • Training staff to identify inconsistencies in speech, tone, or lip-syncing

    To prevent/ stop deep fakes:

    Verification Protocols

    • Multi-channel validation: Always verify requests (especially financial or sensitive) using multiple communication methods (e.g., follow up a video call with a phone call).
    • Out-of-band authentication: Use known trusted channels, especially for executive or high-value communications.

    AI Detection Tools

    • Implement deepfake detection software that analyzes facial expressions, blinking patterns, audio mismatches, and inconsistencies in lighting or shadows.
      • Examples: Microsoft Video Authenticator, Deepware Scanner, Reality Defender, Truepic.
    • Monitor for synthetic media using content authentication tools like:
      • Content Provenance and Authentication (CPA) standards
      • C2PA (Coalition for Content Provenance and Authenticity)-enabled tools

    Email & Communication Filtering

    • Use advanced threat protection (ATP) systems and email filters to detect phishing and spoofing attempts.
    • Monitor for anomalous patterns in video or audio calls (e.g., executive voice showing up from an unknown IP).

    Digital Watermarking & Content Authentication

    • Encourage the use of digital watermarks or cryptographic signatures on legitimate media.
    • Platforms and media creators can implement tools that verify the authenticity and origin of a video or image.

    Alerts News and Events Phishing scam
    Previous Article5 Active Malware Campaigns in Early 2025: What You Need to Know

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (334)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (105)
    • Security Awareness (263)
    • Security Guides (35)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.