diff --git a/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md b/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md index e69de29bb..20232cade 100644 --- a/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md +++ b/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md @@ -0,0 +1,7 @@ +# Impersonation + +Impersonation in cybersecurity refers to an attack technique where a threat actor pretends to be a legitimate person or entity to deceive individuals, systems, or organizations. This tactic is commonly used in social engineering attacks to gain unauthorized access to sensitive information, resources, or systems. + +Visit the following resources to learn more: + +- [@article@What is an Impersonation Attack?](https://www.upguard.com/blog/impersonation-attack)