This is a dedicated watch page for a single video.
Jake, a cybersecurity analyst, noticed that an attacker is intercepting and possibly altering the communication between two parties without their knowledge. This attacker is neither one of these two parties and is situated on the communication path between them. What type of attack is Jake most likely observing?