Manoj Asnani, VP Product and Design at Balbix:
“Terdot uses two attack vectors to exploit users – phishing and Man-in-the-middle. Enterprises that have deployed breach prediction systems that comprehensively cover all attack vectors are able to defend against Terdot more effectively. But, it should be noted that most of today’s detection solutions are single attack vector focused. A multi-vector system is needed in this case – and would have proactively flagged users that are at risk of phishing, in addition to compromised or spoofed certificates.”