Close Menu
  • Home
  • Higher ED
  • News
  • Regulations
    • U.S. State Privacy Legislation
    • General Data Protection Regulation
    • New York Privacy Act
    • California Privacy Rights Act/California Consumer Privacy Act
  • AI
    • AI – Info Tech News
    • Fordham Artificial Intelligence for Faculty and Staff
    • How Emory University Accelerated AI Research in the Cloud
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Facebook X (Twitter) Instagram
Trending
  • Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
  • U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor
  • Beyond Goodbye: Safeguarding Employee Data Privacy After Death
  • AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk
  • Are You Ready for Web 3?
  • Stay Ahead of Scammers in 2025
  • What are VPNs?
  • LinkedIn Accused of Using Private Messages to Train AI Models
Facebook X (Twitter) Instagram
Privacy at Fordham University
  • Home
  • Higher ED

    Strengthening Website Security in Higher Education: Lessons from the FTC’s GoDaddy Settlement

    January 21, 2025

    Merging AI Innovation with IT Expertise in Risk Management

    January 6, 2025

    Staff Highlight – Marc Herzog

    January 3, 2025

    Staff Highlight – Shannon Ortiz

    January 2, 2025

    AI Guidance in Schools

    October 4, 2024
  • News
  • Regulations
    1. U.S. State Privacy Legislation
    2. General Data Protection Regulation
    3. New York Privacy Act
    4. California Privacy Rights Act/California Consumer Privacy Act
    Featured

    Reauthorized Section 702 of the Foreign Intelligence Surveillance Act

    By Josephine Law, FIP, CIPP/US, CIPMApril 22, 20242 Mins Read
    Recent

    U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

    February 21, 2025

    Beyond Goodbye: Safeguarding Employee Data Privacy After Death

    February 19, 2025

    Opt-In or Opt-Out, Does it Matter?

    January 20, 2025
  • AI
    1. AI – Info Tech News
    2. Fordham Artificial Intelligence for Faculty and Staff
    3. How Emory University Accelerated AI Research in the Cloud
    Featured

    Merging AI Innovation with IT Expertise in Risk Management

    By Josephine Law, FIP, CIPP/US, CIPMJanuary 6, 20251 Min Read
    Recent

    Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort

    July 22, 2025

    AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk

    February 19, 2025

    LinkedIn Accused of Using Private Messages to Train AI Models

    January 30, 2025
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Privacy at Fordham University
You are at:Home»AI»Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
AI

Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort

CeCe Law, FCRH '27By CeCe Law, FCRH '27July 22, 2025Updated:July 23, 2025No Comments2 Mins Read
A picture of a woman placing her face on a model.
Example of deep fake via deepfakemaker.io
Share
Facebook Twitter LinkedIn Pinterest Copy Link

As deepfake technology becomes more advanced and accessible, it poses a growing threat to cybersecurity, particularly in the form of disinformation, social engineering, and phishing attacks. In response to this evolving risk landscape, several authoritative organizations have released guidance and resources to help  understand and mitigate these threats.

NSA, FBI, and CISA Joint Cybersecurity Information Sheet (CSI) on Deepfake Threats

Released on September 12, 2023, this alert introduces a joint publication by the NSA, FBI, and CISA titled “Contextualizing Deepfake Threats to Organizations”.
The official PDF document outlines the risks associated with synthetic media, including how malicious actors may use deepfakes for:

    • Impersonating executives in video or audio calls

    • Influencing public opinion and trust

    • Manipulating or fabricating evidence

    • Enabling sophisticated social engineering or phishing attacks

The guide encourages organizations to adopt a proactive approach by enhancing media authentication processes, promoting user awareness, and incorporating deepfake detection capabilities into their cybersecurity strategies.

University of Florida’s Deepfake Phishing Awareness

The University of Florida’s IT Security Office expands on the concept by providing educational resources on how deepfakes are used in phishing. It emphasizes the growing risk of attackers using voice and video impersonation in business email compromise (BEC) and similar scams. The page offers practical steps to recognize potential deepfake-based phishing attempts, including:

    • Being cautious with urgent or unusual voice/video messages

    • Verifying identities through multiple channels

    • Training staff to identify inconsistencies in speech, tone, or lip-syncing

To prevent/ stop deep fakes:

Verification Protocols

    • Multi-channel validation: Always verify requests (especially financial or sensitive) using multiple communication methods (e.g., follow up a video call with a phone call).

    • Out-of-band authentication: Use known trusted channels, especially for executive or high-value communications.

AI Detection Tools

    • Implement deepfake detection software that analyzes facial expressions, blinking patterns, audio mismatches, and inconsistencies in lighting or shadows.

        • Examples: Microsoft Video Authenticator, Deepware Scanner, Reality Defender, Truepic.

    • Monitor for synthetic media using content authentication tools like:

        • Content Provenance and Authentication (CPA) standards

        • C2PA (Coalition for Content Provenance and Authenticity)-enabled tools

Email & Communication Filtering

    • Use advanced threat protection (ATP) systems and email filters to detect phishing and spoofing attempts.

    • Monitor for anomalous patterns in video or audio calls (e.g., executive voice showing up from an unknown IP).

Digital Watermarking & Content Authentication

    • Encourage the use of digital watermarks or cryptographic signatures on legitimate media.

    • Platforms and media creators can implement tools that verify the authenticity and origin of a video or image.

AI artificial intelligence news Security
CeCe Law, FCRH '27

I'm an English major set to graduate in 2027, and I'm currently gaining valuable experience as a DevOps Application and System Security Intern in the Office of Information Technology. In this role, I assist with security applications/tools like web application scanning, web application firewall, MFA, and privilege access management. I also handle creating documentation, user interface text, online help, and tutorials for security-related products. I'm a self-motivated individual with a knack for quick learning, strong organizational skills, attention to detail, and the ability to prioritize, multitask, and meet deadlines. I'm excited to continue expanding my skills and knowledge in this dynamic field.

Related Posts

U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

February 21, 2025

Beyond Goodbye: Safeguarding Employee Data Privacy After Death

February 19, 2025

AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk

February 19, 2025
Privacy
  • Data Privacy FAQs
  • Your Privacy Questions Answered
  • Visions of Privacy
Search
Categories
  • AI (78)
  • CCPA (9)
  • GDPR (20)
  • Higher ED (25)
  • New Jersey Privacy (2)
  • New Jersey Privacy Law (2)
  • New York Privacy Act (7)
  • News (188)
  • Privacy (173)
  • Regulations (65)
Archives

Fordham University - The Jesuit University of New York

Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.
Copyright © Fordham University
Facebook X (Twitter) Instagram YouTube LinkedIn
© 2025 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.