AI Phishing and Deepfakes Outpace Corporate Defenses in 2025 Survey
A new survey of 3,500 business leaders paints a contradictory picture of corporate cybersecurity: 82% of respondents feel prepared for modern threats, yet AI-driven attacks including voice cloning, deepfake imagery, and AI-generated phishing are evolving faster than the organizations designed to stop them. The gap between perceived readiness and actual exposure is exactly where attackers thrive, and individuals are increasingly caught in the crossfire.
For everyday users, the survey findings are a practical warning. When enterprise-grade defenses struggle to keep pace with AI phishing and deepfake-based social engineering, individuals using personal devices, home networks, and consumer email accounts face the same threats with far fewer protections in place.
How AI-Generated Phishing and Voice Cloning Work Against Everyday Users
Traditional phishing relied on obvious tells: grammatical errors, suspicious sender addresses, generic greetings. AI-generated phishing eliminates most of those cues. Using large language models, attackers can now produce highly personalized messages that reference real details about a target, their employer, recent purchases, or publicly visible activity, all scraped and assembled automatically.
Voice cloning adds another layer. With as little as a few seconds of audio, commercially available tools can replicate someone's voice convincingly enough to deceive family members, colleagues, or financial institutions. A fake call from what sounds like a company executive asking an employee to transfer funds, or a cloned voice of a family member claiming to be in distress, represents a social engineering capability that no spam filter or email scanner is built to catch.
Deeply convincing video deepfakes follow the same logic. They're used to impersonate authority figures in video calls, fabricate evidence of events that never occurred, and manipulate targets into disclosing credentials or authorizing access. Together, these techniques represent a shift from opportunistic phishing to precision-targeted credential harvesting.
Why Traditional Security Tools Struggle to Stop AI-Driven Social Engineering
Most enterprise security tools were designed around a different threat model: malicious files, compromised URLs, and network intrusions. AI-driven social engineering sidesteps all three. There's no malware attachment to flag, no suspicious domain to block, and no network anomaly to detect. The attack lives entirely in human perception.
This is the core reason corporate defenses are struggling even when security budgets are substantial. Security awareness training teaches employees to look for the traditional red flags that AI-generated attacks now reliably avoid. Even technical controls like multi-factor authentication, while still valuable, can be bypassed when a target is deceived into handing over a one-time code during a voice cloning call.
The concept of "shadow AI" compounds this problem further. Employees using unauthorized AI tools inside corporate environments create data exposure risks that security teams often cannot monitor or contain. Sensitive documents fed into personal AI assistants, for example, can inadvertently build the very datasets that make targeted phishing more convincing.
Understanding how AI is already being used to profile and target individuals is a critical starting point. The AI-Powered Surveillance: What You Need to Know in 2026 guide offers important context on how personal data aggregation enables the kind of precision targeting that makes these attacks so effective.
Where VPNs and Encryption Fit Into Your Defense Against Credential Theft
VPNs and encryption don't prevent a deepfake video from being convincing. What they do is reduce the attack surface that feeds the targeting process and protects your credentials if an attack partially succeeds.
Credential-harvesting attacks often begin with passive data collection: intercepting unencrypted traffic on public or home networks, capturing login sessions on unsecured connections, or monitoring browsing behavior to identify which services a target uses. A VPN encrypts traffic between your device and the wider internet, removing the easiest interception points from that chain.
Encryption also matters at rest. Password managers with strong encryption ensure that even if a phishing attack captures one credential, it doesn't cascade into access across every service you use. Combined with multi-factor authentication on accounts that support it, encrypted credential storage meaningfully raises the cost of a successful attack.
For remote workers connecting to corporate systems, VPN use is even more directly relevant. Many credential-harvesting campaigns target the moment of authentication, and an encrypted tunnel makes that moment far harder to monitor from outside the connection.
Practical Steps Privacy-Conscious Users Can Take Right Now
The survey findings suggest that waiting for organizations to solve this problem from the top down is not a reliable strategy. Here are concrete steps individuals can take:
Audit what data is publicly accessible about you. AI-generated phishing draws on public sources: social media profiles, professional directories, data broker databases. Reducing your public footprint limits the raw material available for personalized attacks. Review your privacy settings across social platforms and consider submitting opt-out requests to major data broker sites.
Be skeptical of unexpected urgency over any channel. Voice cloning and deepfake attacks almost always manufacture time pressure: an executive who needs a wire transfer now, a family member who needs help immediately. Establish a personal verification protocol, such as a callback number you already have saved, rather than trusting the number or channel that initiated the contact.
Use a VPN on all networks, not just public Wi-Fi. Home networks are increasingly targeted as remote work has made them a credible entry point into corporate systems. Encrypting your traffic consistently closes an interception vector that most users leave open.
Enable phishing-resistant authentication where available. Hardware security keys and passkeys are significantly harder to defeat through social engineering than traditional one-time codes because they don't produce a value an attacker can relay in real time.
Stay informed about how AI profiling works. The more you understand about how your digital behavior is aggregated and analyzed, the better equipped you are to recognize when something designed to feel personal and urgent may have been constructed algorithmically. The AI-Powered Surveillance guide is a practical resource for building that understanding.
The 2025 survey data is a reminder that the confidence gap in cybersecurity is not just a corporate problem. When AI phishing and deepfake attacks evolve faster than enterprise defenses, individuals need to be active participants in their own security rather than passive beneficiaries of systems that are, by the evidence, struggling to keep pace. Auditing your personal threat exposure now, before a convincing voice call or a perfectly worded message tests your defenses, is the most effective move you can make.




