|
2024
|
Invention
|
Scanning of codebases for vulnerable cloud resource dependencies.
Vulnerable cloud resource depe... |
|
|
Invention
|
Detecting anomalous loading of dynamic-link libraries. Anomalous loading of a dynamic-link librar... |
|
|
Invention
|
Chat detection and response for enterprise data security. A system for preventing submission of s... |
|
2023
|
Invention
|
Detection of bring your own vulnerable driver attacks in windows-based systems. Bring Your Own Vu... |
|
|
Invention
|
Malware families identification based upon hierarchical clustering. Behavior report generation mo... |
|
|
Invention
|
Scanning of interactable objects of virtual worlds. Interactable objects of a virtual world are s... |
|
|
Invention
|
Scanning of security logs to detect data indicative of cyber threats. Filters that include matchi... |
|
|
Invention
|
Detecting malicious shell scripts in compute instances of cloud computing platforms. A cloud comp... |
|
|
Invention
|
System and method for identifying anomalous network threat events that occur in a private compute... |
|
|
Invention
|
Identifying software products that are installed on a computer. Software products that are instal... |
|
|
Invention
|
Securing network traffic between a web client and a secure web gateway. A secure web gateway is d... |
|
|
Invention
|
Protection of public-facing computing assets of an organization. A system for protecting public-f... |
|
|
Invention
|
Identifying similar geographically proximate infrastructures from a known network address. Simila... |
|
2022
|
Invention
|
System and method for evaluating performance of a patching process of an enterprise network. An e... |
|
|
Invention
|
Scanning of files in a customer account of a cloud service for cybersecurity. A cloud computing i... |
|
|
Invention
|
Random access of a member file in a compressed tar archive. A cloud computing infrastructure host... |
|
|
Invention
|
Protection of personally identifiable information of users on a computer network. A cybersecurity... |
|
|
Invention
|
Protecting computers from malicious distributed configuration profiles. An endpoint computer is p... |
|
|
Invention
|
Adaptive actions for responding to security risks in computer networks. System and method for tak... |
|
2021
|
Invention
|
Graph-based anomaly detection for cybersecurity. Anomalous activities on a computer network are d... |
|
|
Invention
|
Privacy protection for customer events logs of cybersecurity events. System and methods of analyz... |
|
|
Invention
|
Detecting an operational state of antivirus software. Proper functioning of an antivirus software... |
|
|
Invention
|
Systems and methods for preventing information leakage. A system for preventing information leaka... |
|
|
Invention
|
Detecting unauthorized access points in a network. Methods and apparatus for detecting, in a gate... |
|
|
Invention
|
Systems and methods for facilitating malicious site detection. A system for facilitating Internet... |
|
|
Invention
|
Detecting network entities that pose a cybersecurity risk to a private computer network. A risk k... |
|
|
Invention
|
Detection and identification of malware using a hierarchical evolutionary tree. A computer system... |
|
|
Invention
|
Internet access control based on external third-party data. Systems and methods for Internet acce... |
|
|
Invention
|
Secure video content transmission over a computer network. A computer network includes a camera n... |
|
|
Invention
|
On-demand scanning of e-mail attachments. An attachment to an e-mail message received at an e-mai... |
|
|
Invention
|
Automated mitigation of cyber threats using a semantic cybersecurity database. Systems and method... |
|
|
Invention
|
Decryption of encrypted network traffic using an inline network traffic monitor. An inline networ... |
|
|
Invention
|
Protection of kernel extension in a computer. A method protects a daemon in an operating system o... |
|
|
Invention
|
Multiclass classification system with accumulator-based arbitration. A multiclass classifier gene... |
|
2020
|
Invention
|
Mitigation of cyberattacks on cellular devices. A pause command is sent to a Subscriber Identity ... |
|
|
Invention
|
Detection of unauthorized internet of things devices in a computer network. Disclosed are a syste... |
|
|
Invention
|
Malicious code scanning of remotely-located files. A file is stored in a public cloud storage. A ... |
|
|
Invention
|
Robust whitelisting of legitimate files using similarity score and suspiciousness score. A locali... |
|
|
Invention
|
Detecting unsecure data flow in automation task programs. An automation task program is inspected... |
|
|
Invention
|
Stateful detection of cyberattacks. A system for stateful detection of cyberattacks includes an e... |
|
2019
|
Invention
|
False alarm reduction by novelty detection. Features of sample files that are known to be normal ... |
|
|
Invention
|
Password protection with independent virtual keyboard. A virtual keyboard rendered on a separate ... |
|
|
Invention
|
Systems and methods for detecting scam emails. A scam detection system includes a user computer t... |
|
|
Invention
|
Methods and arrangement for preventing spam comments without application specific changes. A meth... |
|
|
Invention
|
Clustering of binary files using architecture-agnostic digests. A target binary file is clustered... |
|
|
Invention
|
Automatic charset and language detection with machine learning. Language-based machine learning a... |
|
|
Invention
|
Frictionless authentication for logging on a computer service. A login authentication process to ... |
|
|
Invention
|
System and method for detecting malicious scripts. An endpoint system receives a target file for ... |
|
2018
|
Invention
|
Context-aware machine learning system. A machine learning system includes multiple machine learni... |
|
2001
|
P/S
|
TECHNICAL CONSULTATION AND SUPPORT SERVICES IN THE FIELD OF COMPUTERS, COMPUTER SOFTWARE AND COMP... |
|
|
P/S
|
providing online computer databases in the fields of computers, computer security and computer sy... |