A tactic deployed across multiple traffic-based threats, including SSL Stripping, Traffic Tampering, and TLS Downgrade. Malicious actors can use external, forced reductions to traffic security or packet manipulation.
Receive Zimperium proprietary research notes and vulnerability bulletins in your inbox