Imposters were reported using stolen identities, fake video, and doctored voices to access sensitive company data, according to the feds. Reading time 2 minutes Companies hiring for an open IT ...