The Dark Side of Valentine's Day: AI Romance Scams  | Cybersecurity Today

The Dark Side of Valentine's Day: AI Romance Scams | Cybersecurity Today

Author: Jim Love February 15, 2026 Duration: 1:10:12

This special Valentine's Day episode of Cybersecurity Today examines romance scams (often called pig butchering) and how fraudsters exploit trust, vulnerability, and loneliness. 

Host Jim Love speaks with McAfee Head of Threat Research Abhishek Karnik  about new findings showing the scale and demographics of these scams, including widespread encounters with fake or AI-generated profiles, frequent financial solicitations, and that men are also heavily impacted. 

Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst

The episode features survivor Beth Highland's detailed account of being manipulated via Tinder through long-term messaging, an AI video call, forged documents, and a crypto payout scheme that led her to send about $26,000 via Bitcoin ATMs before her financial advisor—trained in romance fraud—helped her recognize the scam and stop further losses, including a demanded $50,000 "activation fee." Beth discusses emotional aftereffects, stigma, reporting, red flags, and her book, "Diary of a Romance Scam: 

When Swiping Right Goes Wrong," along with her advocacy work. The conversation broadens to the role of AI in making scams more realistic (deepfakes, voice/video, document generation), the importance of privacy and not overposting, involving trusted family/advisors, institutional training and intervention points along the fraud "kill chain," and using technology and education to detect and reduce scams.

LINKS 
Beth Hyland's Book - Diary of a Romance Scam: When Swiping Right Goes Wrong
https://www.amazon.com/Diary-Romance-Scam-Swiping-Right/dp/1662962843


00:00 Sponsor: Meter's all-in-one networking stack
00:18 Valentine's Day on the dark side: heartbreak meets cybercrime
02:15 Romance scams ("pig butchering") are everywhere—who gets targeted
04:15 McAfee research: fake profiles, AI, and the real victim demographics
07:07 How scammers hook you: profiling, psychology, and long-game manipulation
09:01 Beth's story begins: post-divorce, isolation, and trying Tinder
10:36 The perfect match: mirroring, fast intimacy, and early red flags
14:32 AI video call + the push-pull breakup: emotional control tactics
17:09 The money trap: Qatar story, bank access, and Bitcoin ATM payments
23:34 The $50K "activation fee" and the wake-up call from a financial advisor
26:25 Cutting him off—and getting pulled back in by guilt and gaslighting
30:18 How to help victims: listening, tools, and where to get support
33:17 Turning pain into purpose: Beth's book and grieving a romance scam
34:47 Turning Pain Into Purpose: Supporting Romance-Scam Survivors
35:56 Stop Blaming Victims: Changing the Language Around Scams
38:38 "It Can Happen to Anybody": Why Smart People Get Hooked
40:58 Social Engineering 101: How Scams Exploit Different Emotions
42:14 Why McAfee Is Focusing on Consumer Scams (and the AI Factor)
45:43 AI Deepfakes & Low-Cost Tools: The New Scam Industrialization
49:19 Oversharing, Spearphishing & Replay Attacks: How Victims Get Retargeted
53:24 Practical Red Flags: Meeting in Person, Isolation Tactics, Family Checks
57:08 Training the "Kill Chain": Banks, Cashiers, Advisors & Early Intervention
01:00:33 Tech Fighting Tech: Detection, Identity Protection & Digital Assistants
01:02:57 What's Next: Agentic AI, Bigger Attack Surfaces & Trust-and-Safety by Design
01:08:03 Wrap-Up: Start the Conversation, Resources, and Final Thanks


Every morning, Jim Love sifts through the noise of the digital world to bring you a clear, concise briefing on what actually matters. Cybersecurity Today isn't about fearmongering; it's about practical awareness. You'll hear straightforward analysis of the most recent attacks targeting companies, from sophisticated ransomware campaigns to stealthy data theft. Jim breaks down the implications of major breach disclosures, explaining not just what was stolen, but how it happened and who is affected. The focus remains on actionable intelligence-concrete steps and strategic thinking that can help protect your organization's data and infrastructure. This daily podcast serves as an essential filter for IT professionals, business leaders, and anyone responsible for digital assets, transforming complex threats into understandable insights. Tune in for a grounded perspective on navigating an online landscape where the risks are constantly evolving, and the need for clear, timely information has never been greater.
Author: Language: English Episodes: 100

Cybersecurity Today
Podcast Episodes
Cisco Breached: Source Code Stolen - Cybersecurity Today [not-audio_url] [/not-audio_url]

Duration: 15:03
Cisco Source Code Stolen in Trivy Fallout, Axios Supply Chain Attack, and Active Exploitation of Fortinet and Citrix Flaws David Shipley reports multiple major security incidents: attackers used credentials stolen in the…
Russian State Hackers Go After IoS Devices [not-audio_url] [/not-audio_url]

Duration: 19:42
Mac Malware 'Infinity Stealer,' DarkSword iOS Exploits, China Telecom Espionage & TeamTNT Supply Chain Hits Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a c…
Anonymous Tip System Breach May Expose Tipsters [not-audio_url] [/not-audio_url]

Duration: 11:28
Anonymous Tip System Breach Exposes Millions of Records, Google Warns Q-Day by 2029, and New AI Documentation Supply-Chain Risks Cybersecurity Today would like to thank Meter for their support in bringing you this podcas…
Startup Accused Of Helping Fake Privacy and Security Audits [not-audio_url] [/not-audio_url]

Duration: 12:41
Compliance Startup Audit-Faking Claims, Trivy Supply-Chain Backdoor, Russia Targets Signal/WhatsApp, and Iran-Linked Stryker Disruption Cybersecurity Today would like to thank Meter for their support in bringing you this…
The Fundamental Mistake in Cybersecurity Risk Management [not-audio_url] [/not-audio_url]

Duration: 49:39
Cybersecurity Isn't Managing Risk—It's Managing Threats... And That's the Problem Host David Shipley speaks with Jeff Gardiner, a former university CISO and now at Morgan Stanley, about Gardiner's doctoral research argui…
Another Medical Device Firm Hit [not-audio_url] [/not-audio_url]

Duration: 14:24
Medical Device Breaches, Anti-Scam Pledge Scrutiny, AI Font Trick, and Iran-Linked Cyber Updates. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete ne…