As digital communication expands across email, messaging apps, and social platforms, so does the sophistication of cyber threats. Among the most persistent are phishing, smishing, and impersonation attacks—each designed to exploit trust and urgency. While they differ in delivery, they share a common goal: extracting sensitive information or gaining unauthorized access.