Attacker assumes the identity of another individual

Brand Impersonation

Attacker impersonates an legitimate brand or company

Typo-squatting

Attacker registers a domain name that is similar to a popular website

Watering Hole Attack

Comprise a website that is commonly visited by the victim