Attacker physically taps into a network cable and intercepts the traffic passing through the cable.
Last updated 1 year ago