International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF
Volume 74 | Issue 1 | Year 2026 | Article Id. IJCTT-V74I1P102 | DOI : https://doi.org/10.14445/22312803/IJCTT-V74I1P102

Cybersecurity Risks of Social Media Platforms in the Age of Artificial Intelligence


Yash Patel

Received Revised Accepted Published
21 Nov 2025 29 Dec 2025 13 Jan 2026 29 Jan 2026

Citation :

Yash Patel, "Cybersecurity Risks of Social Media Platforms in the Age of Artificial Intelligence," International Journal of Computer Trends and Technology (IJCTT), vol. 74, no. 1, pp. 7-11, 2026. Crossref, https://doi.org/10.14445/22312803/IJCTT-V74I1P102

Abstract

Social media platforms now sit at the center of everyday communication for individuals and organizations. That visibility and reach also make them attractive to attackers. As Artificial Intelligence (AI) becomes embedded in social media ecosystems through content creation tools, recommendation systems, automated interaction, and moderation, well-known threats such as phishing and impersonation are being reshaped rather than replaced. This article reviews double-masked peer-reviewed research on cybersecurity risks tied to social media use, with emphasis on how AI-enabled techniques amplify deception, accelerate malicious content spread, and complicate detection. A thematic analysis synthesizes empirical findings across social engineering, account compromise, malicious link distribution, data leakage, and human factors. The literature indicates that social media security problems are socio-technical: attacks succeed through a mix of platform features, organizational workflows, and user judgment under pressure. The article closes with stakeholder-specific implications for platform developers, organizational security teams, and policymakers, and identifies research gaps that remain unresolved.

Keywords

Social Engineering, Phishing, AI-Enabled Threats, Data Leakage, Artificial Intelligence.

References

[1] Zainab Alkhalil et al., “Phishing Attacks: A Recent Comprehensive Study and a New Anatomy,” Frontiers of Computer Science, vol. 3, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[2] Yazan Boshmaf et al., “The Socialbot Network: When Bots Socialize for Fame and Money,” Proceedings of the 27th Annual Computer Security Applications Conference, pp. 93-102, 2011.
[
CrossRef] [Google Scholar] [Publisher Link]

[3] Yazan Boshmaf et al., “Design and Analysis of a Social Botnet,” Computer Networks, vol. 57, no. 2, pp. 556-578, 2013.
[
CrossRef] [Google Scholar] [Publisher Link]

[4] Qiang Cao et al., “Aiding the Detection of Fake Accounts in Large Scale Social Online Services,” 9th USENIX Symposium on Networked Systems Design and Implementation, 2012.
[
Google Scholar] [Publisher Link]

[5] Sayak Saha Roy, Unique Karanjit, and Shirin Nilizadeh, “What Remains Uncaught? Characterizing Sparsely Detected Malicious URLs on Twitter,” Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[6] Manuel Egele et al., “COMPA: Detecting Compromised Accounts on Social Networks,” Network and Distributed System Security Symposium, vol. 13, pp. 83-91, 2013.
[
Google Scholar] [Publisher Link]

[7] Jaron Mink et al., “DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks,” Proceedings of the 31st USENIX Security Symposium, 2022.
[
Google Scholar] [Publisher Link]

[8] Hongyu Gao et al., “Detecting and Characterizing Social Spam Campaigns,” Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35–47, 2010.
[
CrossRef] [Google Scholar] [Publisher Link]

[9] Hongyu Gao et al., “Towards Online Spam Filtering in Social Networks.,” Proceedings of the Network and Distributed System Security Symposium (NDSS), pp. 1-16, 2012.
[
Google Scholar]

[10] Oana Goga et al., “Exploiting Innocuous Activity for Correlating Users Across Sites,” Proceedings of the 22nd International Conference on World Wide Web, pp. 447-458, 2013.
[
CrossRef] [Google Scholar] [Publisher Link]

[11] Ralph Gross, and Alessandro Acquisti, “Information Revelation and Privacy in Online Social Networks,” Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71-80, 2005.
[
CrossRef] [Google Scholar] [Publisher Link]

[12] Grant Ho et al., “Detecting Credential Compromise in Enterprise Environments,” Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security, 2017.
[
Google Scholar] [Publisher Link]

[13] Tom N. Jagatic et al., “Social Phishing,” Communications of the ACM, vol. 50, no. 10, pp. 94-100, 2007.
[
CrossRef] [Google Scholar] [Publisher Link]

[14] Katharina Krombholz et al., “Advanced Social Engineering Attacks,” Journal of Information Security and Applications, vol. 22, pp. 113-122, 2015.
[
CrossRef] [Google Scholar] [Publisher Link]

[15] Xin Luo et al., “Investigating Phishing Victimization with The Heuristic–Systematic Model: A Theoretical Framework and An Exploration,” Computers and Security, 38, pp. 28-38, 2013.
[
CrossRef] [Google Scholar] [Publisher Link]

[16] Lukasz Olejnik et al., “The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API,” Data Privacy Management, and Security Assurance, pp. 254-263, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[17] Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna, “Detecting Spammers on Social Networks,” Proceedings of the 26th Annual Computer Security Applications Conference, 2010.
[
CrossRef] [Google Scholar] [Publisher Link]

[18] Gianluca Stringhini et al., “Follow the Green: Growth and Dynamics in Twitter Follower Markets,” Proceedings of the 2013 Internet Measurement Conference, pp. 163-176, 2013.
[
CrossRef] [Google Scholar] [Publisher Link]

[19] Gang Wang et al., “Social Turing Tests: Crowdsourcing Sybil Detection,” Social and Information Networks, 2012.
[
CrossRef] [Google Scholar] [Publisher Link]

[20] Biwei Yan et al., “On Protecting the Data Privacy of Large Language Models (LLMs) and LLM Agents: A Literature Review,” High-Confidence Computing, vol. 5, no. 2, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

[21] Qingying Hao et al., “It Doesn’t Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors,” Proceedings of the 33rd USENIX Security Symposium, Philadelphia, PA, USA, 3027-3044, 2024.
[
Google Scholar] [Publisher Link]