International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 8, Issue 1 (January-February 2026) Submit your research before last 3 days of February to publish your research paper in the issue of January-February.

Cybersecurity Challenges in Modern Challenges: Emerging Threats and AI-Powered Defence Mechanisms

Author(s) Ms. Tanya Verma, Ms. Plaaksha Chaudhry, Dr. Shalini Lamba, Dr. Gaurvi Shukla
Country India
Abstract The rapid digital transformation of global systems has intensified the complexity and scope of cyber threats, positioning cybersecurity as a vital priority for businesses, governments, and individuals. This analysis investigates prominent modern threats, including ransomware, supply chain breaches, malicious software, and phishing schemes, while assessing the shortcomings of conventional protective measures like firewalls, antivirus programs, and intrusion detection tools. The study also explores the growing influence of Artificial Intelligence (AI) in bolstering cybersecurity through sophisticated threat identification, automated response mechanisms, and dynamic defense approaches. By synthesizing insights from academic research and industry analyses (2022–2025), this work underscores the advantages of AI-driven security solutions, such as improved detection precision, continuous monitoring, and behavior-based analytics. However, it also addresses challenges like reliance on data, vulnerabilities to adversarial attacks, and ethical considerations. The results advocate for a strategic blend of AI technologies and human supervision to create robust, forward-thinking, and ethically responsible cybersecurity frameworks.
Keywords Artificial Intelligence, Cybersecurity, AI in Cybersecurity, Threat Detection, Ransomware, Malware, Phishing, Supply Chain Attacks, Machine Learning, Intrusion Detection Systems, Automated Response, Behavioral Analytics.
Field Computer > Network / Security
Published In Volume 8, Issue 1, January-February 2026
Published On 2026-01-04
DOI https://doi.org/10.36948/ijfmr.2026.v08i01.65488
Short DOI https://doi.org/hbhsf9

Share this