Phishing continues to be one of the most widespread and effective tactics, techniques, and procedures (TTPs) in today’s cyber threat landscape. It often serves as a gateway to data breaches that can have devastating consequences for organizations and individuals alike. For example, General Dynamics, a leading aerospace and defense contractor, reported in late 2024 that a phishing attack targeting its personnel resulted in threat actors compromising dozens of employee benefits accounts.
By exploiting human psychology and trust, phishing attacks often circumvent technical defenses and pave the way for large-scale cyber incidents. The 2025 Verizon Business Data Breach Investigations Report (PDF) shows that phishing accounted for 16 percent of cybersecurity incidents. Only credential abuse at 22 percent and the exploitation of vulnerabilities at 20 percent outranked phishing. Although Zscaler’s ThreatLabz 2025 Phishing Report found a 20 percent decline in overall phishing volume, attackers are shifting to highly targeted campaigns that focus on HR, IT, finance, and payroll departments.
In addition, phishing is no longer limited to email inboxes. Attacks now occur across non-email channels such as social media, search engines, and messaging apps. Poor grammar and spelling can no longer be relied upon to detect malicious messages. Cybercriminals increasingly use artificial intelligence (AI) to create highly personalized, scalable, and convincing phishing campaigns that resemble legitimate communications.
This next generation of phishing is faster, smarter, and more dangerous than before. Cybercriminals have always relied on psychological manipulation by building trust, creating urgency, and exploiting emotion. AI now amplifies that strategy through:
- Highly personalized messages created with personal and behavioral data scraped from social media, breached databases, and Dark Web sources
- Perfectly polished grammar and tone, eliminating a common red flag
- Automated, dynamic conversations across email, SMS, and collaboration tools that mimic colleagues or executives
Phishing that once required manual effort and time can now be launched at scale. Threat actors can deploy thousands of individualized attacks instantly.
The New Frontier of Phishing
Several factors are accelerating the effectiveness of AI-driven phishing:
- LinkedIn bypasses traditional security controls: LinkedIn direct messages can completely evade the email security tools most organizations rely on. Employees access LinkedIn on corporate devices, yet security teams often have no visibility into these communications. Attackers can therefore reach employees directly without triggering traditional security safeguards.
- Real-time impersonation: AI can generate deepfake voice clones that convincingly imitate executives in live phone calls. AI-generated video can simulate leaders in virtual meetings to approve fraudulent wire transfers or request confidential information. As remote work remains widespread, these impersonation attacks are becoming exceedingly difficult for employees to detect.
- Business Email Compromise (BEC) at machine speed: Compromised accounts allow AI tools to conduct dynamic, multi-step conversations with employees. Attackers can analyze internal workflows, invoice cycles, and approval structures, which makes their financial fraud attempts extremely believable. With automation, adversaries can stay hidden far longer than before.
AI-powered phishing is no longer just about stealing login details. It now enables continuous identity exploitation, creating fundamental cybersecurity challenges:
- AI-generated documents and synthetic identities can bypass weak verification
- Fraudulent onboarding can provide legitimate-looking access to sensitive systems
- Once inside, attackers can use AI to automate lateral movement and escalate privileges
Ultimately, identity is the new battleground—and AI is transforming cybercriminals into highly efficient identity thieves.
How Organizations Can Fight Back
Defending against AI‑equipped adversaries requires a shift in strategy. Organizations must:
- Adopt advanced identity threat detection and risk mitigation tools capable of spotting anomalies in access patterns—not just catching phishing emails
- Use adaptive and phishing‑resistant authentication, including biometrics and possession‑bound credentials, rather than relying solely on passwords or SMS codes
- Educate employees continuously, using simulated training that reflects modern AI‑driven attack tactics
- Implement Zero Trust access principles to limit the damage when credentials are compromised
AI has given cybercriminals the ability to operate like Fortune‑500‑scale marketing departments—except their product is account takeover, data theft, and identity fraud. The line between legitimate and malicious communication will continue to blur, making traditional defenses increasingly ineffective.
To stay ahead, organizations must recognize that identity is now the most valuable—and most vulnerable—target. Only by modernizing defense strategies and embracing phishing‑resistant identity protection can they hope to outpace the next wave of AI‑driven threats.

