Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Deepfake Attacks Hit Two-Thirds of Businesses
News

Deepfake Attacks Hit Two-Thirds of Businesses

Team-CWDBy Team-CWDSeptember 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Nearly two-thirds (62%) of organizations have experienced a deepfake attack in the past 12 months, according to a new Gartner survey.

These deepfake attacks encompass either social engineering, impersonating someone during a video or audio call with an employee or exploiting automated verification, such as face or voice biometrics.

Akif Khan, senior director at Gartner Research, told Infosecurity that continuous improvements in deepfake technologies mean such threats are only going to grow.

Need for Deepfake Detection Integrated in Everyday Tools

He said the most pervasive technique currently in this space is deepfakes being combined with social engineering, such as impersonating an executive to get an employee to transfer a large sum of money into an attacker-controlled account.

“That’s trickier because social engineering is a perpetually reliable thing for attackers to use. When you throw deepfakes in there your employees really are on the frontline of trying to spot something is unusual. You can’t just rely on automated defenses to protect you,” Khan explained.

To protect against this threat, Khan urged organizations to consider emerging technical solutions, in which vendors can bake deepfake detection into tools such as Microsoft Teams or Zoom.

“That’s relatively new, there are not many large-scale production deployments so it still remains to be seen how effective that can really be once its operationalized in an environment,” he cautioned.

In the immediate term, Khan said that some organizations have implemented effective awareness training programs specifically around deepfakes. This includes creating deepfakes of company executives and using them in simulations to employees.

Another aspect is reviewing current business processes in areas such as payment approvals. Khan advised putting in place authorization at the application level to ensure these attacks are detected.

“This means the CFO can phone and ask you to transfer some money, the payment can be set up in the finance application, but then the CFO needs to log on to the finance application, ideally with phishing-resistant multi-factor authentication (MFA), and actually authorize that transaction,” Khan noted.

Targeting of AI Applications

The report, published during the Gartner Security & Risk Management Summit 2025, also found that 32% of organizations have experienced an attack on AI applications leveraged the application prompt in the past 12 months.

These attacks include prompt injection – where attackers generate large language models (LLMs) into generating biased or malicious output.

Khan told Infosecurity that the results are consistent with the conversations Gartner has had with clients around attacks on AI applications.

“Around two-thirds said that they haven’t experienced any attacks – that is a useful sanity check that this is a threat but is it the biggest threat that organizations face? No it’s not. But it is one that they do need to take seriously because we do have approximately 5% of respondents saying they have had a major incident,” he commented.

Khan advised security leaders to focus on several areas to protect AI applications, including shadow AI and how access is managed to company approved or developed tools.

Gartner surveyed 302 cybersecurity leaders in North America, EMEA and Asia/Pacific for the report.

Read more from the Gartner summit: Organizations Must Update Defenses to Scattered Spider Tactics, Experts Urge



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSamsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
Next Article FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
Team-CWD
  • Website

Related Posts

News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.