ethical-hacker video for a cybersecurity analyst is investigating a breach where an attacker intercepted and modified financial transaction data before it
A cybersecurity analyst is investigating a breach where an attacker intercepted and modified financial transaction data before it reached its destination. The attacker successfully altered the transaction amount and recipient details without raising immediate suspicion. What type of attack has occurred?