Attacker assumes the identity of another individual
Brand Impersonation
Attacker impersonates an legitimate brand or company
Typo-squatting
Attacker registers a domain name that is similar to a popular website
Watering Hole Attack
Comprise a website that is commonly visited by the victim