
5.22.25
The digital world is experiencing profound disruption in cybersecurity, digital identity (ID), and online fraud. As technology advances at an unprecedented pace, so do the tactics of cybercriminals, posing significant challenges for businesses, governments, and consumers worldwide. Emerging technologies like artificial intelligence (AI), the Internet of Things (IoT), and quantum computing are double-edged swords—providing both opportunities for defense and new avenues for exploitation.
Even more information on this industry is available! Check out our Cybersecurity Industry Center.
Plunkett’s Cybersecurity, Digital ID & Online Fraud Industry eBook, latest edition.
- The Soaring Cost of Cybercrime and Expanding Threats
The global cost of cybercrime is expected to balloon to $6.8 trillion by 2026, encompassing theft of funds, intellectual property, and personal data, along with fraud damages, system downtimes, and reputational harm. While global spending on cybersecurity solutions is forecast to surpass $267 billion by 2026, the pace of attacks often outstrips defense measures.
Major cyberattacks are increasingly geopolitical in nature, with nation-states like China, Russia, Iran, and North Korea implicated in large-scale cyber espionage, infrastructure sabotage, and data theft. The U.S. Department of Justice’s 2025 indictment of 12 Chinese nationals for involvement in a global “Hacker-for-Hire” ecosystem exemplifies these rising threats.
High-profile corporate breaches, such as the MOVEit file transfer exploit that affected over 62 million individuals and thousands of organizations, highlight how even sophisticated entities can fall victim.
- AI: A Tool for Both Defense and Attack
AI and machine learning are revolutionizing cybersecurity defenses, enabling real-time detection of anomalies and threats, automated risk scoring, and smarter fraud prevention tools. Solutions such as Google’s AI-powered Cloud Security Workbench exemplify this shift.
Yet, cybercriminals are increasingly leveraging generative AI to launch more convincing phishing emails, create deepfake videos, and impersonate individuals using synthetic voices and faces. The ability of AI to automate attacks at scale means that even inexperienced fraudsters can launch sophisticated campaigns using AI tools available on the dark web for a fraction of the cost previously required.
- Quantum Computing: The Impending Encryption Crisis
Quantum computing is poised to become one of the most significant security challenges of the next decade. By exploiting quantum mechanics, these computers will have the capacity to break current encryption methods, rendering much of today’s data protection obsolete. Recognizing this threat, the U.S. National Institute of Standards and Technology (NIST) has developed post-quantum encryption standards, which financial institutions and chipmakers are beginning to test.
- The Rise of Digital ID Fraud and Credential Stuffing
With more governments and corporations adopting digital ID systems, fraudsters are exploiting these new vulnerabilities. Account takeovers (ATOs), synthetic identity fraud, and credential stuffing—where bots test stolen usernames and passwords across multiple platforms—are soaring.
Despite the availability of multi-factor authentication (MFA), biometrics, and behavior-based verification, many consumers continue to reuse weak passwords, exposing themselves and the organizations they interact with to risk. The growth of the dark web, fueled by massive data breaches, has made personal information readily available at minimal cost, enabling even novice criminals to commit identity fraud on a large scale.
- IoT, Smart Cities, and the Expanding Attack Surface
The explosion of IoT devices and smart cities is dramatically broadening the cyberattack surface. Hackers now target not just computers but a vast web of connected devices—smart refrigerators, cameras, industrial sensors—that can act as gateways to larger networks, a tactic known as “island hopping”.
Smart cities, while boosting urban efficiency, create significant privacy and security challenges. These systems gather granular data on citizen movements, raising concerns about surveillance, abuse, and vulnerability to hacking. Without stringent security frameworks, these networks can be exploited for criminal, terrorist, or espionage activities.
- Payments Fraud and Peer-to-Peer (P2P) Scams
The surging popularity of P2P payment apps like Zelle and Venmo has made transactions more seamless but also opened doors to fraud. Criminals exploit these platforms, particularly in scenarios where users send funds to unfamiliar parties without built-in fraud protection measures.
Beyond P2P fraud, online payment systems face an evolving threat landscape, with Business Email Compromise (BEC), ransomware, and botnet attacks becoming more common. Fraudsters’ abilities to launch attacks globally from anywhere make prevention and response more challenging for law enforcement and financial institutions.
- Zero Trust and Next-Generation Network Security
The zero-trust model—where no device, user, or location is trusted by default—is rapidly becoming the gold standard in cybersecurity. Organizations are deploying tools that enforce continuous authentication, verify device integrity, and monitor behavioral anomalies in real time.
Next-generation firewalls (NGFWs) and AI-enhanced VPNs are transforming from passive barriers to dynamic threat detection systems, capable of blocking malicious traffic, isolating compromised devices, and providing administrators with actionable intelligence.
- AI as a Cybersecurity Service (SaaS)
AI-based cybersecurity solutions are increasingly being delivered via SaaS platforms, offering scalability, customization, and constant updates. Companies like FRISS provide AI-driven fraud detection tools to insurers, while banks and e-commerce platforms integrate cloud-based solutions that dynamically adjust fraud detection thresholds based on evolving threats.
- The Expanding Role of Big Data and Predictive Analytics
The integration of big data, AI, and predictive analytics is transforming not only cybersecurity but also sectors like healthcare, finance, and logistics. By rapidly analyzing massive datasets, organizations can spot fraud patterns, optimize operations, and forecast emerging risks. However, the vast data lakes also present lucrative targets for hackers, necessitating airtight security measures.
The cybersecurity, digital ID, and online fraud landscape is entering an era where defensive innovation must accelerate to outpace increasingly sophisticated threats. AI, quantum computing, and IoT offer transformative benefits but also introduce new vulnerabilities. Organizations must embrace zero-trust models, invest in AI-driven threat intelligence, and educate users on best practices, such as password hygiene and phishing awareness. Moreover, collaboration between private enterprises, governments, and international bodies is essential to establish global security standards, share threat intelligence, and create deterrence strategies that match the scale of emerging digital threats.
Key Concepts: Authentication, cybersecurity, cyberfraud, digital id, fraud, hacking, privacy, security, malware
Source: Plunkett Research, Ltd., Copyright © 2025