Man-in-the-Middle
Edited
A cyberattack where a malicious actor positions themselves between two parties to disrupt and view data transfers.
A cyberattack where a malicious actor positions themselves between two parties to disrupt and view data transfers.