Attackers often use stolen login qualifications to examine guarded documents or steal the info although it truly is in transit among two network devices. Details Theft: Also referred to as information exfiltration, data theft takes place when an attacker works by using their unauthorized accessibility to get private data https://ieeexplore.ieee.org/document/9941250