| System and Method for Cybersecurity Threat Monitoring Using Dynamically-Updated … |
2023-6-20 |
2024-1-04 |
|
| Systems and Methods for Attack Simulation on a Production Network |
2023-5-08 |
2023-8-31 |
|
| System and method for analyzing binary code for malware classification using … |
2023-4-24 |
2023-10-19 |
|
| System and Method for Surfacing Cyber-Security Threats with a Self-Learning … |
2023-4-24 |
2023-10-19 |
|
| Automated Enforcement of Security Policies in Cloud and Hybrid Infrastructure … |
2023-2-06 |
2023-6-15 |
|
| Churn-aware machine learning for cybersecurity threat detection |
2023-1-25 |
2023-5-25 |
|
| Dynamic adaptive defense for cyber-security threats |
2023-1-23 |
2023-5-25 |
|
| Multi-vector malware detection data sharing system for improved detection |
2023-1-13 |
2023-12-26 |
2023-12-26 |
| Subscription and key management system |
2022-12-05 |
2024-1-30 |
2024-1-30 |
| System and method for heterogeneous transferred learning for enhanced … |
2022-10-17 |
2023-6-15 |
|
| Subscription-based malware detection |
2022-7-25 |
2024-1-02 |
2024-1-02 |
| System and method for scanning remote services to locate stored objects with … |
2022-6-20 |
2023-5-30 |
2023-5-30 |
| Selective virtualization for security threat detection |
2022-4-03 |
2024-1-09 |
2024-1-09 |
| System and method for automatically prioritizing rules for cyber-threat … |
2022-3-31 |
2024-1-16 |
2024-1-16 |
| System and method for retrieval and analysis of operational data from customer, … |
2022-3-31 |
2023-9-05 |
2023-9-05 |
| System and method for detecting repetitive cybersecurity attacks constituting … |
2021-7-26 |
2024-1-23 |
2024-1-23 |
| Detection of phishing attacks using similarity analysis |
2021-1-25 |
2023-1-31 |
2023-1-31 |
| Run-time configurable cybersecurity system |
2020-12-23 |
2023-12-05 |
2023-12-05 |
| System and method for circumventing evasive code for cyberthreat detection |
2020-12-23 |
2022-9-06 |
2022-9-06 |
| Malicious javascript detection based on abstract syntax trees (AST) and deep … |
2020-12-17 |
2024-1-30 |
2024-1-30 |
| Detecting information operations campaigns in social media with machine … |
2020-9-04 |
2024-1-09 |
2024-1-09 |
| Systems and methods for attack simulation on a production network |
2020-8-24 |
2023-7-18 |
2023-7-18 |
| Distributed malware detection system and submission workflow thereof |
2020-4-06 |
2023-4-18 |
2023-4-18 |
| System and method for cybersecurity analyzer update and concurrent management … |
2020-2-20 |
2023-4-25 |
2023-4-25 |
| System and method for detecting malicious traffic using a virtual machine … |
2020-2-14 |
2023-4-25 |
2023-4-25 |
| Automated system for triage of customer issues |
2019-12-24 |
2023-3-07 |
2023-3-07 |
| System and method for detecting cyberattacks impersonating legitimate sources |
2019-12-23 |
2020-8-06 |
|
| Determining malware via symbolic function hash analysis |
2019-12-20 |
2021-11-16 |
2021-11-16 |
| Methods and apparatus for graphical user interface environment for creating … |
2019-12-18 |
2020-10-29 |
|
| System, apparatus and method for automatically verifying exploits within … |
2019-11-08 |
2021-8-10 |
2021-8-10 |
| Malware detection verification and enhancement by coordinating endpoint and … |
2019-10-28 |
2022-2-01 |
2022-2-01 |
| System and method for offloading packet processing and static analysis … |
2019-10-21 |
2021-8-03 |
2021-8-03 |
| System and method for identifying and mitigating cyberattacks through malicious … |
2019-9-27 |
2024-1-30 |
2024-1-30 |
| Methods and apparatus for detecting and preventing obfuscated cyberattacks … |
2019-9-25 |
2023-4-04 |
2023-4-04 |
| System and method for detecting and protecting against cybersecurity attacks on … |
2019-8-30 |
2023-6-13 |
2023-6-13 |
| System and method of detecting delivery of malware using cross-customer data |
2019-8-30 |
2021-5-25 |
2021-5-25 |
| Framework for classifying an object as malicious with machine learning for … |
2019-7-29 |
2021-1-26 |
2021-1-26 |
| Dynamically remote tuning of a malware content detection system |
2019-7-01 |
2022-4-05 |
2022-4-05 |
| System and method for supporting cross-platform data verification |
2019-6-28 |
2022-7-19 |
2022-7-19 |
| Systems and methods for automated cybersecurity analysis of extracted binary … |
2019-6-27 |
2023-1-17 |
2023-1-17 |
| System and method for automatically associating cybersecurity intelligence to … |
2019-6-24 |
2022-2-22 |
2022-2-22 |
| Launcher for setting analysis environment variations for malware detection |
2019-5-06 |
2020-11-10 |
2020-11-10 |
| System and method for threat detection and identification |
2019-5-06 |
2021-8-03 |
2021-8-03 |
| Systems and methods for testing known bad destinations in a production network |
2019-4-29 |
2020-9-03 |
|
| Dynamic guest image creation and rollback |
2019-3-25 |
2021-7-20 |
2021-7-20 |
| Cyber-security system and method for detecting escalation of privileges within … |
2019-3-14 |
2022-4-26 |
2022-4-26 |
| Method to detect application execution hijacking using memory protection |
2019-2-15 |
2022-2-08 |
2022-2-08 |
| Platform and method for retroactive reclassification employing a cybersecurity- … |
2018-12-17 |
2022-3-08 |
2022-3-08 |
| Platform and method for performing cybersecurity analyses employing an … |
2018-12-17 |
2022-2-01 |
2022-2-01 |
| Platform and Method for Enhanced Cyber-Attack Detection and Response Employing … |
2018-12-17 |
2019-7-04 |
|
| System and method for detecting malicious scripts through natural language … |
2018-12-13 |
2021-3-23 |
2021-3-23 |
| Virtualized exploit detection system |
2018-12-03 |
2020-5-26 |
2020-5-26 |
| System and method for triggering analysis of an object for malware in response … |
2018-11-16 |
2020-12-22 |
2020-12-22 |
| Correlation and consolidation holistic views of analytic data pertaining to a … |
2018-11-05 |
2020-10-20 |
2020-10-20 |
| Late load technique for deploying a virtualization layer underneath a running … |
2018-10-15 |
2021-12-14 |
2021-12-14 |
| Analytic-based security monitoring system and method |
2018-10-15 |
2020-7-28 |
2020-7-28 |
| Intelligent system for mitigating cybersecurity risk by analyzing domain name … |
2018-9-28 |
2020-4-02 |
|
| Intelligent system for mitigating cybersecurity risk by analyzing domain name … |
2018-9-28 |
2020-4-02 |
|
| System and method for bootkit detection |
2018-9-27 |
2023-9-19 |
2023-9-19 |
| System and method for detecting and remediating a cybersecurity attack |
2018-9-24 |
2020-8-25 |
2020-8-25 |
| System and method for detecting time-bomb malware |
2018-9-24 |
2019-7-02 |
2019-7-02 |
| System and method for mitigating cyberattacks against processor operability by … |
2018-9-13 |
2021-11-23 |
2021-11-23 |
| Malicious message analysis system |
2018-8-13 |
2020-3-03 |
2020-3-03 |
| System and method for improved end-to-end cybersecurity machine learning and … |
2018-7-30 |
2022-1-18 |
2022-1-18 |
| Classifying sets of malicious indicators for detecting command and control … |
2018-7-23 |
2020-4-28 |
2020-4-28 |
| System and method for verifying a cyberthreat |
2018-7-23 |
2020-6-30 |
2020-6-30 |
| System and method for detecting interpreter-based exploit attacks |
2018-7-23 |
2021-1-05 |
2021-1-05 |
| Multi-version application support and registration within a single operating … |
2018-7-16 |
2021-12-28 |
2021-12-28 |
| Malicious network content detection |
2018-7-16 |
2020-8-25 |
2020-8-25 |
| Systems and methods for generation of signature generation using interactive … |
2018-7-16 |
2020-12-15 |
2020-12-15 |
| Real-time visual playback with synchronous textual analysis log display and … |
2018-7-09 |
2021-2-23 |
2021-2-23 |
| Ransomware file modification prevention technique |
2018-6-29 |
2021-1-12 |
2021-1-12 |
| Post-intrusion detection of cyber-attacks during lateral movement within … |
2018-6-29 |
2020-12-01 |
2020-12-01 |
| Cyber-security system and method for weak indicator detection and correlation … |
2018-6-29 |
2020-5-06 |
|
| System and method for distributed cluster configuration monitoring and … |
2018-6-28 |
2022-1-18 |
2022-1-18 |
| Verification of trusted threat-aware visualization layer |
2018-6-18 |
2022-2-08 |
2022-2-08 |
| System and method for identifying phishing cyber-attacks through deep machine … |
2018-6-08 |
2020-11-10 |
2020-11-10 |
| Threat-aware architecture |
2018-4-16 |
2020-8-11 |
2020-8-11 |
| System and method for detecting exfiltration content |
2018-4-02 |
2019-11-05 |
2019-11-05 |
| Microvisor-based malware detection appliance architecture |
2018-4-02 |
2020-1-07 |
2020-1-07 |
| Attribute-controlled malware detection |
2018-3-30 |
2020-2-05 |
|
| System and method for automatically generating malware detection rule … |
2018-3-30 |
2021-5-11 |
2021-5-11 |
| System and method for predicting and mitigating cybersecurity system … |
2018-3-29 |
2020-11-03 |
2020-11-03 |
| Detection efficacy of virtual machine-based analysis with application specific … |
2018-3-12 |
2020-1-14 |
2020-1-14 |
| System and method for virtual analysis of network data |
2018-3-05 |
2020-4-14 |
2020-4-14 |
| Malicious content analysis using simulated user interaction without user … |
2018-3-05 |
2020-11-24 |
2020-11-24 |
| Dynamically adaptive framework and method for classifying malware using … |
2018-3-05 |
2020-7-14 |
2020-7-14 |
| Fuzzy hash of behavioral results |
2018-3-05 |
2019-2-26 |
2019-2-26 |
| System and method for detecting malicious links in electronic messages |
2018-2-05 |
2019-12-10 |
2019-12-10 |
| Method and system for efficient cybersecurity analysis of endpoint events |
2017-12-28 |
2021-5-11 |
2021-5-11 |
| Systems and methods for malware defense |
2017-12-04 |
2018-10-09 |
2018-10-09 |
| Intelligent context aware user interaction for malware detection |
2017-12-04 |
2020-10-06 |
2020-10-06 |
| Susceptible environment detection system |
2017-11-17 |
2019-10-15 |
2019-10-15 |
| Cyber attack early warning system |
2017-11-17 |
2020-12-22 |
2020-12-22 |
| Security cloud service framework for hardening in the field code of mobile … |
2017-11-17 |
2019-1-15 |
2019-1-15 |
| Enterprise search |
2017-11-03 |
2020-10-06 |
2020-10-06 |
| Framework For Efficient Security Coverage Of Mobile Software Applications |
2017-10-16 |
2018-5-03 |
|
| Phishing attack detection |
2017-10-01 |
2020-10-13 |
2020-10-13 |
| System and method for enforcing compliance with subscription requirements for … |
2017-9-29 |
2020-11-24 |
2020-11-24 |
| System and method for preventing malware evasion |
2017-9-27 |
2020-8-18 |
2020-8-18 |