Spoofing refers to cyberattacks where adversaries impersonate trusted identities — such as executives, email domains, phone numbers, or systems — to manipulate users into taking harmful actions. Common forms include email spoofing, executive impersonation, caller ID spoofing, and invoice fraud. In modern attacks, spoofing is often combined with social engineering and automation to bypass technical controls and exploit human trust. This tag covers real-world spoofing techniques, detection strategies, prevention best practices, and how identity-based security controls can reduce impersonation risk.