An attack vector where a machine intercepts traffic between two devices to eavesdrop on data without the two target victim devices recognizing the attack.

Susan Morrow
- CYBERSECURITY TERMS
Talk to our Team today

An attack vector where a machine intercepts traffic between two devices to eavesdrop on data without the two target victim devices recognizing the attack.
Susan Morrow