An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location
An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location