From 8944cc034a6abee271ef6a0bd15fe53a7d957d42 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jes=C3=BAs=20Enrique=20Alcal=C3=A1=20Rojas?= Date: Wed, 14 Aug 2024 21:06:15 -0400 Subject: [PATCH] Add content to impersonation attack (#6572) --- .../content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md b/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md index e69de29bb..20232cade 100644 --- a/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md +++ b/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md @@ -0,0 +1,7 @@ +# Impersonation + +Impersonation in cybersecurity refers to an attack technique where a threat actor pretends to be a legitimate person or entity to deceive individuals, systems, or organizations. This tactic is commonly used in social engineering attacks to gain unauthorized access to sensitive information, resources, or systems. + +Visit the following resources to learn more: + +- [@article@What is an Impersonation Attack?](https://www.upguard.com/blog/impersonation-attack)