Research Article | Open Access | Download PDF
Volume 74 | Issue 1 | Year 2026 | Article Id. IJCTT-V74I1P102 | DOI : https://doi.org/10.14445/22312803/IJCTT-V74I1P102Cybersecurity Risks of Social Media Platforms in the Age of Artificial Intelligence
Yash Patel
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 21 Nov 2025 | 29 Dec 2025 | 13 Jan 2026 | 29 Jan 2026 |
Citation :
Yash Patel, "Cybersecurity Risks of Social Media Platforms in the Age of Artificial Intelligence," International Journal of Computer Trends and Technology (IJCTT), vol. 74, no. 1, pp. 7-11, 2026. Crossref, https://doi.org/10.14445/22312803/IJCTT-V74I1P102
Abstract
Social media platforms now sit at the center of everyday communication for individuals and organizations. That visibility and reach also make them attractive to attackers. As Artificial Intelligence (AI) becomes embedded in social media ecosystems through content creation tools, recommendation systems, automated interaction, and moderation, well-known threats such as phishing and impersonation are being reshaped rather than replaced. This article reviews double-masked peer-reviewed research on cybersecurity risks tied to social media use, with emphasis on how AI-enabled techniques amplify deception, accelerate malicious content spread, and complicate detection. A thematic analysis synthesizes empirical findings across social engineering, account compromise, malicious link distribution, data leakage, and human factors. The literature indicates that social media security problems are socio-technical: attacks succeed through a mix of platform features, organizational workflows, and user judgment under pressure. The article closes with stakeholder-specific implications for platform developers, organizational security teams, and policymakers, and identifies research gaps that remain unresolved.
Keywords
Social Engineering, Phishing, AI-Enabled Threats, Data Leakage, Artificial Intelligence.
References
[1] Zainab Alkhalil et al., “Phishing Attacks: A Recent
Comprehensive Study and a New Anatomy,” Frontiers of Computer Science,
vol. 3, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Yazan Boshmaf et al., “The Socialbot Network: When Bots
Socialize for Fame and Money,” Proceedings of the 27th Annual
Computer Security Applications Conference, pp. 93-102, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Yazan Boshmaf et al., “Design and Analysis of a Social
Botnet,” Computer Networks, vol. 57, no. 2, pp. 556-578, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Qiang Cao et al., “Aiding the Detection of Fake Accounts in
Large Scale Social Online Services,” 9th USENIX Symposium on
Networked Systems Design and Implementation, 2012.
[Google Scholar] [Publisher Link]
[5] Sayak Saha Roy, Unique Karanjit, and Shirin Nilizadeh, “What
Remains Uncaught? Characterizing Sparsely Detected Malicious URLs on Twitter,” Workshop
on Measurements, Attacks, and Defenses for the Web (MADWeb), 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Manuel Egele et al., “COMPA: Detecting Compromised Accounts
on Social Networks,” Network and Distributed System Security Symposium,
vol. 13, pp. 83-91, 2013.
[Google Scholar] [Publisher Link]
[7] Jaron Mink et al., “DeepPhish: Understanding User Trust
Towards Artificially Generated Profiles in Online Social Networks,” Proceedings
of the 31st USENIX Security Symposium, 2022.
[Google Scholar] [Publisher Link]
[8] Hongyu Gao et al., “Detecting and Characterizing Social
Spam Campaigns,” Proceedings of the 10th ACM SIGCOMM Conference
on Internet Measurement, pp. 35–47, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Hongyu Gao et al., “Towards Online Spam Filtering in Social
Networks.,” Proceedings of the Network and Distributed System Security
Symposium (NDSS), pp. 1-16, 2012.
[Google Scholar]
[10] Oana Goga et
al., “Exploiting
Innocuous Activity for Correlating Users Across Sites,” Proceedings of the
22nd International Conference on World Wide Web, pp. 447-458,
2013.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ralph Gross, and Alessandro
Acquisti, “Information Revelation and Privacy in Online Social Networks,” Proceedings
of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71-80,
2005.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Grant Ho et al., “Detecting
Credential Compromise in Enterprise Environments,” Proceedings of the 24th
ACM SIGSAC Conference on Computer and Communications Security, 2017.
[Google Scholar] [Publisher Link]
[13] Tom N. Jagatic et al.,
“Social Phishing,” Communications of the ACM, vol. 50, no. 10, pp.
94-100, 2007.
[CrossRef] [Google Scholar] [Publisher
Link]
[14] Katharina
Krombholz et al., “Advanced Social Engineering Attacks,” Journal of Information Security
and Applications, vol. 22, pp. 113-122, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Xin Luo et al.,
“Investigating Phishing Victimization with The Heuristic–Systematic Model: A
Theoretical Framework and An Exploration,” Computers and Security, 38,
pp. 28-38, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Lukasz Olejnik et al., “The
Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API,” Data
Privacy Management, and Security Assurance, pp. 254-263, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Gianluca
Stringhini, Christopher Kruegel, and Giovanni Vigna, “Detecting Spammers on Social
Networks,” Proceedings of the 26th Annual Computer Security
Applications Conference, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Gianluca
Stringhini et al., “Follow the Green: Growth and Dynamics in Twitter Follower Markets,” Proceedings
of the 2013 Internet Measurement Conference, pp. 163-176, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Gang Wang et
al., “Social
Turing Tests: Crowdsourcing Sybil Detection,” Social and Information Networks,
2012.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Biwei Yan et
al., “On
Protecting the Data Privacy of Large Language Models (LLMs) and LLM Agents: A
Literature Review,” High-Confidence Computing, vol. 5, no. 2, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Qingying Hao et
al., “It
Doesn’t Look Like Anything to Me: Using Diffusion Model to Subvert Visual
Phishing Detectors,” Proceedings of the 33rd USENIX Security
Symposium, Philadelphia, PA, USA, 3027-3044, 2024.
[Google Scholar] [Publisher Link]