Mastering Impersonation in Cybersecurity: Tactics, Risks, and Countermeasures