An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit
An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit