Eavesdropping typically occurs through man-in-the-middle attacks or by exploiting weak encryption protocols. In a man-in-the-middle attack, the attacker intercepts the communication between the sender and the recipient, often without either party being aware. Weak encryption protocols, on the other hand, can make it easier for cybercriminals to decode the intercepted data.