Manoj Asnani, VP Product and Design at Balbix:

“Terdot uses two attack vectors to exploit users – phishing and Man-in-the-middle. Enterprises that have deployed breach prediction systems that comprehensively cover all attack vectors are able to defend against Terdot more effectively. But, it should be noted that most of today’s detection solutions are single attack vector focused. A multi-vector system is needed in this case – and would have proactively flagged users that are at risk of phishing, in addition to compromised or spoofed certificates.”

Subscribe
Notify of
guest

0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
0
Would love your thoughts, please comment.x
()
x