2022
|
Invention
|
System and method for scanning remote services to locate stored objects with malware. A non-trans... |
|
Invention
|
System and method for retrieval and analysis of operational data from customer, cloud-hosted virt... |
2021
|
Invention
|
Detection of phishing attacks using similarity analysis. A computerized system and method to dete... |
2020
|
Invention
|
Subscription and key management system. One embodiment of the described invention is directed to ... |
|
Invention
|
System and method for circumventing evasive code for cyberthreat detection. One embodiment of the... |
|
Invention
|
Subscription-based malware detection. A computerized method is described for authenticating acces... |
|
Invention
|
Distributed malware detection system and submission workflow thereof. As described, a cloud-based... |
|
Invention
|
System and method for cybersecurity analyzer update and concurrent management system. An electron... |
|
Invention
|
System and method for detecting malicious traffic using a virtual machine configured with a selec... |
2019
|
Invention
|
Automated system for triage of customer issues. A device for verifying previous determinations fr... |
|
Invention
|
System, apparatus and method for automatically verifying exploits within suspect objects and high... |
|
Invention
|
Malware detection verification and enhancement by coordinating endpoint and malware detection sys... |
|
Invention
|
System and method for offloading packet processing and static analysis operations. According to o... |
|
Invention
|
Selective virtualization for security threat detection. Selective virtualization of resources is ... |
|
Invention
|
System and method for detecting and protecting against cybersecurity attacks on servers. An elect... |
|
Invention
|
System and method of detecting delivery of malware using cross-customer data. According to one em... |
|
Invention
|
Framework for classifying an object as malicious with machine learning for deploying updated pred... |
|
Invention
|
System and method for supporting cross-platform data verification. A trust verification system fo... |
|
Invention
|
System and method for threat detection and identification. Exemplary systems and methods for malw... |
|
Invention
|
Launcher for setting analysis environment variations for malware detection. A system and method f... |
|
Invention
|
Dynamic guest image creation and rollback. According to one embodiment, a computerized method com... |
|
Invention
|
Multi-vector malware detection data sharing system for improved detection. A computerized method ... |
|
Invention
|
Method to detect application execution hijacking using memory protection. According to one embodi... |
2018
|
Invention
|
System and method for scanning remote services to locate stored objects with malware. A system an... |
|
Invention
|
Platform and method for performing cybersecurity analyses employing an intelligence hub with a mo... |
|
Invention
|
System and method for triggering analysis of an object for malware in response to modification of... |
|
Invention
|
Late load technique for deploying a virtualization layer underneath a running operating system. A... |
|
Invention
|
System and method for bootkit detection. An embodiment of a computerized method for detecting boo... |
|
Invention
|
System and method for mitigating cyberattacks against processor operability by a guest process. A... |
|
Invention
|
System and method for detecting interpreter-based exploit attacks. For one embodiment, a computer... |
|
Invention
|
Multi-version application support and registration within a single operating system environment. ... |
|
Invention
|
Systems and methods for generation of signature generation using interactive infection visualizat... |
|
Invention
|
Real-time visual playback with synchronous textual analysis log display and event/time indexing. ... |
|
Invention
|
Ransomware file modification prevention technique. A computerized system and method to detect ran... |
|
Invention
|
Post-intrusion detection of cyber-attacks during lateral movement within networks. A method and s... |
|
Invention
|
System and method for distributed cluster configuration monitoring and management. A cyber-threat... |
|
Invention
|
System and method for detecting repetitive cybersecurity attacks constituting an email campaign. ... |
|
Invention
|
Verification of trusted threat-aware visualization layer. A trusted threat-aware microvisor may b... |
|
Invention
|
System and method for automatically generating malware detection rule recommendations. A method f... |
|
Invention
|
Malicious content analysis using simulated user interaction without user involvement. Techniques ... |
2017
|
Invention
|
Cyber attack early warning system. A system and method for generating an alert regarding a potent... |
|
Invention
|
System and method for enforcing compliance with subscription requirements for cyber-attack detect... |
|
Invention
|
Data extraction system for malware analysis. According to one embodiment, a computerized method f... |
|
Invention
|
Verification and enhancement using detection systems located at the network periphery and endpoin... |
2016
|
Invention
|
Technique for establishing secure communication between host and guest processes of a virtualizat... |
|
Invention
|
Virtual system and method for securing external network connectivity. According to one embodiment... |
|
Invention
|
Cyber-security framework for application of virtual features. A non-transitory storage medium hav... |
2014
|
Invention
|
Network-based binary file extraction and analysis for malware detection. A system and method are ... |
|
Invention
|
System and method for detecting malicious network content using virtual environment components. M... |