The term #maninthemiddleattack has recently fallen out of favour, after all it could very well not be a man that's listening in. A popular replacement seems to be #machineinthemiddleattack. I think this is a huge missed opportunity for some fun with words. I propose to you:
1. Malfeasant in the middle
2. Mischief in the middle
2. Malcontent in the middle

Do you have any other fun ones?

#security #infosec

Edit: heres another one: miscreant in the middle.

#Meta allegedly snooped on #Snapchat via traffic decryption • The Register

https://www.theregister.com/2024/03/27/meta_snapchat_data/

#Facebook ran low-key studies with groups of willing participants – from teenagers to adults – who were rewarded for installing an #Onavo-made research app that monitored their smartphone usage […]. That app […] installed a root Certificate Authority allowing Facebook to intercept and analyze panel participants' internet usage.“

#maninthemiddleattack

Meta accused of snarfing people's Snapchat data via traffic decryption

I ain't afraid of no ghosts, but in this case...

The Register
ChatGPT und Copilot: Hacker können KI-Nachrichten einfach ausspähen

Die Unterhaltung zwischen KI-Chatbot und euch ist nicht so privat, wie ihr vielleicht glaubt. Sicherheitsforsc

t3n Magazin
Heute haben Studierende der #Kulturanthropologie @KAEEGoetheUni erfolgreich ihre IT Aufmerksamkeit bewiesen: sie haben bei `git push` gemerkt, dass der #Kryptographie Schlüssel des #gitlab Servers nicht stimmte - #ManInTheMiddleAttack? Ein Griff zum #Telefon und den Serveradmin #interview(t). Der war glücklich über die Nachfrage und meinte: die Lernen fürs Leben, vielleicht lernen sie ja #Linux lieben, bei den ganzen Erfahrungen mit #Microsoft. #DigitalisierungBeforschen.

Dear Activists,

Please do not use #eventBrite.

It is 'reverse-proxied' by an #Amazon service called #CloudFront*. Reverse-proxy means it unencrypts all traffic to "ensure quality of service". Back when encryption of sites was a basic priority this would be called #spyware, or a #ManInTheMiddleAttack.

Consider #DFCA to block the dot-'cons' and their spyware.

* not to be confused with #CloudFlare, which does the same and is equally bad.

Most #passwords can be hacked within 15 seconds. Mildly complicated ones under 3 hrs.
And in a not so distant future, all passwords regardless of complexities will be hacked in real-time.
Presently the Chinese are busy harvesting #data on everyone across the globe for such time.

#cybersecurity #hacker #databreach #hackers #StateSponsoredSurveillance #statesponsoredthreatgroup #statesponsored #ddos #maninthemiddleattack #passphrase #password #passwordmanager

FortiGate VPN Default Config Allows MitM Attacks

The client's default configuration for SSL-VPN has a certificate issue, researchers said.

Threatpost - English - Global - threatpost.com
LTE vulnerability allows impersonation of other mobile devices - Researchers have found a way to impersonate mobile devices on 4G and 5G mobile networks, and are c... more: https://nakedsecurity.sophos.com/2020/02/26/lte-vulnerability-allows-impersonation-of-other-mobile-devices/ #impersonationattacksin4gnetworks #impersonationattacks #maninthemiddleattack #securitythreats #mobileoperators #dnsspoofing #dataloss #privacy #mobile #imp4gt #lte #4g #5g
LTE vulnerability allows impersonation of other mobile devices

Naked Security
Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption https://arstechnica.com/?p=1339741 #transportlayersecurity #maninthemiddleattack #Gaming&Culture #encryption #cheating #malware #Biz&IT #gaming #HTTPS #tls
Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption

Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.