https://de.ketiadaan.com/post/what-do-we-call-an-attack-where-a-person-inserts-themselves-into-the-middle-of-a-communication-so-that-they-can-eavesdrop-on-the-data-being-transmitted
What do we call an attack where a person inserts themselves into the middle of a communication so that they can eavesdrop on the data being transmitted?