|
US10902114B1
(en)
*
|
2015-09-09 |
2021-01-26 |
ThreatQuotient, Inc. |
Automated cybersecurity threat detection with aggregation and analysis
|
|
US11277423B2
(en)
*
|
2017-12-29 |
2022-03-15 |
Crowdstrike, Inc. |
Anomaly-based malicious-behavior detection
|
|
US11381984B2
(en)
*
|
2018-03-27 |
2022-07-05 |
Forescout Technologies, Inc. |
Device classification based on rank
|
|
US11265338B2
(en)
|
2018-06-06 |
2022-03-01 |
Reliaquest Holdings, Llc |
Threat mitigation system and method
|
|
US11709946B2
(en)
|
2018-06-06 |
2023-07-25 |
Reliaquest Holdings, Llc |
Threat mitigation system and method
|
|
US11444957B2
(en)
*
|
2018-07-31 |
2022-09-13 |
Fortinet, Inc. |
Automated feature extraction and artificial intelligence (AI) based detection and classification of malware
|
|
USD926809S1
(en)
|
2019-06-05 |
2021-08-03 |
Reliaquest Holdings, Llc |
Display screen or portion thereof with a graphical user interface
|
|
USD926810S1
(en)
|
2019-06-05 |
2021-08-03 |
Reliaquest Holdings, Llc |
Display screen or portion thereof with a graphical user interface
|
|
USD926811S1
(en)
|
2019-06-06 |
2021-08-03 |
Reliaquest Holdings, Llc |
Display screen or portion thereof with a graphical user interface
|
|
USD926200S1
(en)
|
2019-06-06 |
2021-07-27 |
Reliaquest Holdings, Llc |
Display screen or portion thereof with a graphical user interface
|
|
USD926782S1
(en)
|
2019-06-06 |
2021-08-03 |
Reliaquest Holdings, Llc |
Display screen or portion thereof with a graphical user interface
|
|
US11533323B2
(en)
*
|
2019-10-10 |
2022-12-20 |
Target Brands, Inc. |
Computer security system for ingesting and analyzing network traffic
|
|
CN111079144B
(zh)
*
|
2019-11-25 |
2022-07-01 |
杭州迪普科技股份有限公司 |
一种病毒传播行为检测方法及装置
|
|
US11438373B2
(en)
|
2020-01-09 |
2022-09-06 |
Cymulate Ltd. |
Monitoring for security threats from lateral movements
|
|
WO2021144978A1
(ja)
*
|
2020-01-17 |
2021-07-22 |
三菱電機株式会社 |
攻撃推定装置、攻撃推定方法及び攻撃推定プログラム
|
|
CN112287339B
(zh)
*
|
2020-03-06 |
2024-06-04 |
杭州奇盾信息技术有限公司 |
Apt入侵检测方法、装置以及计算机设备
|
|
CN111475818B
(zh)
*
|
2020-04-17 |
2023-08-11 |
北京墨云科技有限公司 |
一种基于ai的自动化渗透测试系统的渗透攻击方法
|
|
US11847214B2
(en)
*
|
2020-04-21 |
2023-12-19 |
Bitdefender IPR Management Ltd. |
Machine learning systems and methods for reducing the false positive malware detection rate
|
|
US20220075871A1
(en)
*
|
2020-09-09 |
2022-03-10 |
Microsoft Technology Licensing, Llc |
Detecting hacker tools by learning network signatures
|
|
CN112269316B
(zh)
*
|
2020-10-28 |
2022-06-07 |
中国科学院信息工程研究所 |
一种基于图神经网络的高鲁棒性威胁狩猎系统与方法
|
|
US12505200B2
(en)
|
2022-05-23 |
2025-12-23 |
Wiz, Inc. |
Techniques for improved virtual instance inspection utilizing disk cloning
|
|
US12579251B2
(en)
|
2021-11-24 |
2026-03-17 |
Wiz, Inc. |
System and method for detecting excessive permissions in identity and access management
|
|
US12278819B1
(en)
|
2021-07-16 |
2025-04-15 |
Wiz, Inc. |
Cybersecurity threat detection utilizing unified identity mapping and permission detection
|
|
US20240137382A1
(en)
|
2021-07-16 |
2024-04-25 |
Wiz, Inc. |
Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping
|
|
US12278840B1
(en)
|
2021-07-16 |
2025-04-15 |
Wiz, Inc. |
Efficient representation of multiple cloud computing environments through unified identity mapping
|
|
US12019730B2
(en)
*
|
2021-09-28 |
2024-06-25 |
Red Hat, Inc. |
Systems and methods for identifying computing devices
|
|
US20230161869A1
(en)
|
2021-11-24 |
2023-05-25 |
Wiz, Inc. |
Generating an enrichment layer and populating a security graph based on configuration code of a cloud computing environment
|
|
US12489781B2
(en)
|
2021-11-24 |
2025-12-02 |
Wiz, Inc. |
Techniques for lateral movement detection in a cloud computing environment
|
|
US12063228B2
(en)
*
|
2021-12-22 |
2024-08-13 |
Cisco Technology, Inc. |
Mitigating security threats in daisy chained serverless FaaS functions
|
|
US11936785B1
(en)
|
2021-12-27 |
2024-03-19 |
Wiz, Inc. |
System and method for encrypted disk inspection utilizing disk cloning techniques
|
|
US12219048B1
(en)
|
2021-12-27 |
2025-02-04 |
Wiz, Inc. |
Techniques for encrypted disk cybersecurity inspection utilizing disk cloning
|
|
US12081656B1
(en)
|
2021-12-27 |
2024-09-03 |
Wiz, Inc. |
Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity
|
|
US11841945B1
(en)
|
2022-01-31 |
2023-12-12 |
Wiz, Inc. |
System and method for cybersecurity threat detection utilizing static and runtime data
|
|
US12531881B2
(en)
|
2022-01-31 |
2026-01-20 |
Wiz, Inc. |
Detection of cybersecurity threats utilizing established baselines
|
|
CN118975199A
(zh)
*
|
2022-01-31 |
2024-11-15 |
微兹公司 |
利用安全图从云日志中进行云检测和响应的技术
|
|
US12267326B2
(en)
|
2022-04-13 |
2025-04-01 |
Wiz, Inc. |
Techniques for detecting resources without authentication using exposure analysis
|
|
US12443720B2
(en)
|
2022-08-10 |
2025-10-14 |
Wiz, Inc. |
Techniques for detecting applications paths utilizing exposure analysis
|
|
US11936693B2
(en)
|
2022-04-13 |
2024-03-19 |
Wiz, Inc. |
System and method for applying a policy on a network path
|
|
US12244627B2
(en)
|
2022-04-13 |
2025-03-04 |
Wiz, Inc. |
Techniques for active inspection of vulnerability exploitation using exposure
|
|
US12395488B2
(en)
|
2022-04-13 |
2025-08-19 |
Wiz, Inc. |
Techniques for analyzing external exposure in cloud environments
|
|
CN114844691B
(zh)
*
|
2022-04-20 |
2023-07-14 |
安天科技集团股份有限公司 |
一种数据处理方法、装置、电子设备及存储介质
|
|
US12061719B2
(en)
|
2022-09-28 |
2024-08-13 |
Wiz, Inc. |
System and method for agentless detection of sensitive data in computing environments
|
|
US12217079B2
(en)
|
2022-05-23 |
2025-02-04 |
Wiz, Inc. |
Detecting security exceptions across multiple compute environments
|
|
US12287899B2
(en)
|
2022-05-23 |
2025-04-29 |
Wiz, Inc. |
Techniques for detecting sensitive data in cloud computing environments utilizing cloning
|
|
US12506755B2
(en)
|
2022-05-23 |
2025-12-23 |
Wiz, Inc. |
Technology discovery techniques in cloud computing environments utilizing disk cloning
|
|
US12212586B2
(en)
|
2022-05-23 |
2025-01-28 |
Wiz, Inc. |
Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources
|
|
US12079328B1
(en)
|
2022-05-23 |
2024-09-03 |
Wiz, Inc. |
Techniques for inspecting running virtualizations for cybersecurity risks
|
|
US12061925B1
(en)
|
2022-05-26 |
2024-08-13 |
Wiz, Inc. |
Techniques for inspecting managed workloads deployed in a cloud computing environment
|
|
US20250378158A1
(en)
|
2022-06-24 |
2025-12-11 |
Binalyze Yazilim A.S. |
Systems and methods for detection of advanced persistent threats in an information network
|
|
JP7812491B2
(ja)
*
|
2022-07-15 |
2026-02-09 |
ブルーボヤント エルエルシー |
ネットワークセキュリティを強化するために、ネットワーク化されたコンピュータ支援脅威ハンティングプラットフォームを利用するデバイス、システム、および方法
|
|
CN117792745B
(zh)
*
|
2023-12-28 |
2025-02-11 |
北京江民新科技术有限公司 |
基于att&ck模型的apt攻击检测方法及系统
|
|
CN118890214B
(zh)
*
|
2024-09-27 |
2024-12-06 |
奇安星城网络安全技术(湖南)有限公司 |
一种针对apt攻击的检测和防御方法
|