PacketViper Blog

Notes from the Field

Blog

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

Attackers rely on proxies because they work. What if you could make proxies work against them? Well, you can, using deception at your network edge.

Mitigate EDoS Attacks: Creeping Normality and the Boiling Frog Fable

Mitigate EDoS Attacks: Creeping Normality and the Boiling Frog Fable

It's time for EDoS to take its place next to DDoS and DoS as things to be fought against and defeated. Learn how in this PacketViper blog.

Read more

VRM with Deception360: Real-time monitoring of your connected vendors

VRM with Deception360: Real-time monitoring of your connected vendors

Read more

How to Detect and Prevent Ruthless Cryptojacking

How to Detect and Prevent Ruthless Cryptojacking

During the gold rush, people ruthlessly mined to find their fortune. See how crypto mining is similar. Detect and prevent cryptojacking with PacketViper.

Read more