Open Access
Open access
volume 5 issue 2 pages 18

Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments

Kristoffer Torngaard Pedersen 1
Lauritz Pepke 1
Tobias Stærmose 1
Maria Papaioannou 1
Gaurav Choudhary 1
Nicola Dragoni 1
Publication typeJournal Article
Publication date2025-04-27
scimago Q1
SJR0.863
CiteScore9.1
Impact factor
ISSN2624800X
Abstract

The evolution of deepfake technology has the potential to reshape the threat landscape in corporate environments by enabling highly convincing digital impersonations. In this paper, we explore how artificial media produced by AI can be misused to assume authoritative personas, leaving traditional cybersecurity programs with significant vulnerabilities. Drawing from interviews with cybersecurity professionals across various industries, we find that the majority of organizations remain vulnerable due to their adoption of broad, vendor-centric security solutions that are not specifically designed to protect against deepfake attacks. In response to the evolving threat landscape, we introduce the PREDICT framework—a cyclical, iterative theoretical model. This model combines definitive policy direction, organizational preparedness, targeted employee training, and advanced AI detection tools. Additionally, it incorporates effective incident response plans with continuous improvement and simulations. Our findings underscore the need to revise the current security protocols and offer practical suggestions for strengthening corporate defenses against the increasingly dynamic threat landscape posed by deepfakes.

Found 
Found 

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
3
Share
Cite this
GOST |
Cite this
GOST Copy
Pedersen K. T. et al. Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments // Journal of Cybersecurity and Privacy. 2025. Vol. 5. No. 2. p. 18.
GOST all authors (up to 50) Copy
Pedersen K. T., Pepke L., Stærmose T., Papaioannou M., Choudhary G., Dragoni N. Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments // Journal of Cybersecurity and Privacy. 2025. Vol. 5. No. 2. p. 18.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.3390/jcp5020018
UR - https://www.mdpi.com/2624-800X/5/2/18
TI - Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments
T2 - Journal of Cybersecurity and Privacy
AU - Pedersen, Kristoffer Torngaard
AU - Pepke, Lauritz
AU - Stærmose, Tobias
AU - Papaioannou, Maria
AU - Choudhary, Gaurav
AU - Dragoni, Nicola
PY - 2025
DA - 2025/04/27
PB - MDPI
SP - 18
IS - 2
VL - 5
SN - 2624-800X
ER -
BibTex |
Cite this
BibTex (up to 50 authors) Copy
@article{2025_Pedersen,
author = {Kristoffer Torngaard Pedersen and Lauritz Pepke and Tobias Stærmose and Maria Papaioannou and Gaurav Choudhary and Nicola Dragoni},
title = {Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments},
journal = {Journal of Cybersecurity and Privacy},
year = {2025},
volume = {5},
publisher = {MDPI},
month = {apr},
url = {https://www.mdpi.com/2624-800X/5/2/18},
number = {2},
pages = {18},
doi = {10.3390/jcp5020018}
}
MLA
Cite this
MLA Copy
Pedersen, Kristoffer Torngaard, et al. “Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments.” Journal of Cybersecurity and Privacy, vol. 5, no. 2, Apr. 2025, p. 18. https://www.mdpi.com/2624-800X/5/2/18.