Sniffing is a process of intercepting data packages on a given network. Whatever interaction that you take on a device that requires a network it will send data under the hood. Now, this data can be intercepted and analyzed by a sniffer.
Sniffers can be both software and hardware and will see as much as the network configuration. For example, if you connect to open wifi with a sniffer, you can intercept all data packages of people connected to that access point on the fly.
Sniffer tools are used by network administrators to troubleshoot, yet a bad actor can also exploit them.
The exploit consists of intercepting and reading those packages. Fortunately, most new services encrypt their traffic so the result of such interception would be gibberish. If the protocols used to send data are not secure with encryption, then all data will be readable by the attacker.
It is one of the reasons that it is of good practice to not trust any open Wifi.
Creating a sniffer requires high programming skills. There are many sniffer tools that one can buy and use out of the box that lower the barrier for people that will use it for bad intentions. If put in context, the probability that one gets hacked by a sniffer is lower than receiving an email with malware. Please remember that the possibility gets higher in case you are, for example, a political target.
Please always take such graph with a pinch of salt.
Such visualizations should make you think, and put things in context rather than show a universal truth.