Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
System and Method for Cybersecurity Threat Monitoring Using Dynamically-Updated … 2023-6-20 2024-1-04
Systems and Methods for Attack Simulation on a Production Network 2023-5-08 2023-8-31
System and method for analyzing binary code for malware classification using … 2023-4-24 2023-10-19
System and Method for Surfacing Cyber-Security Threats with a Self-Learning … 2023-4-24 2023-10-19
Automated Enforcement of Security Policies in Cloud and Hybrid Infrastructure … 2023-2-06 2023-6-15
Churn-aware machine learning for cybersecurity threat detection 2023-1-25 2023-5-25
Dynamic adaptive defense for cyber-security threats 2023-1-23 2023-5-25
Multi-vector malware detection data sharing system for improved detection 2023-1-13 2023-12-26 2023-12-26
Subscription and key management system 2022-12-05 2024-1-30 2024-1-30
System and method for heterogeneous transferred learning for enhanced … 2022-10-17 2023-6-15
Subscription-based malware detection 2022-7-25 2024-1-02 2024-1-02
System and method for scanning remote services to locate stored objects with … 2022-6-20 2023-5-30 2023-5-30
Selective virtualization for security threat detection 2022-4-03 2024-1-09 2024-1-09
System and method for automatically prioritizing rules for cyber-threat … 2022-3-31 2024-1-16 2024-1-16
System and method for retrieval and analysis of operational data from customer, … 2022-3-31 2023-9-05 2023-9-05
System and method for detecting repetitive cybersecurity attacks constituting … 2021-7-26 2024-1-23 2024-1-23
Detection of phishing attacks using similarity analysis 2021-1-25 2023-1-31 2023-1-31
Run-time configurable cybersecurity system 2020-12-23 2023-12-05 2023-12-05
System and method for circumventing evasive code for cyberthreat detection 2020-12-23 2022-9-06 2022-9-06
Malicious javascript detection based on abstract syntax trees (AST) and deep … 2020-12-17 2024-1-30 2024-1-30
Detecting information operations campaigns in social media with machine … 2020-9-04 2024-1-09 2024-1-09
Systems and methods for attack simulation on a production network 2020-8-24 2023-7-18 2023-7-18
Distributed malware detection system and submission workflow thereof 2020-4-06 2023-4-18 2023-4-18
System and method for cybersecurity analyzer update and concurrent management … 2020-2-20 2023-4-25 2023-4-25
System and method for detecting malicious traffic using a virtual machine … 2020-2-14 2023-4-25 2023-4-25
Automated system for triage of customer issues 2019-12-24 2023-3-07 2023-3-07
System and method for detecting cyberattacks impersonating legitimate sources 2019-12-23 2020-8-06
Determining malware via symbolic function hash analysis 2019-12-20 2021-11-16 2021-11-16
Methods and apparatus for graphical user interface environment for creating … 2019-12-18 2020-10-29
System, apparatus and method for automatically verifying exploits within … 2019-11-08 2021-8-10 2021-8-10
Malware detection verification and enhancement by coordinating endpoint and … 2019-10-28 2022-2-01 2022-2-01
System and method for offloading packet processing and static analysis … 2019-10-21 2021-8-03 2021-8-03
System and method for identifying and mitigating cyberattacks through malicious … 2019-9-27 2024-1-30 2024-1-30
Methods and apparatus for detecting and preventing obfuscated cyberattacks … 2019-9-25 2023-4-04 2023-4-04
System and method for detecting and protecting against cybersecurity attacks on … 2019-8-30 2023-6-13 2023-6-13
System and method of detecting delivery of malware using cross-customer data 2019-8-30 2021-5-25 2021-5-25
Framework for classifying an object as malicious with machine learning for … 2019-7-29 2021-1-26 2021-1-26
Dynamically remote tuning of a malware content detection system 2019-7-01 2022-4-05 2022-4-05
System and method for supporting cross-platform data verification 2019-6-28 2022-7-19 2022-7-19
Systems and methods for automated cybersecurity analysis of extracted binary … 2019-6-27 2023-1-17 2023-1-17
System and method for automatically associating cybersecurity intelligence to … 2019-6-24 2022-2-22 2022-2-22
Launcher for setting analysis environment variations for malware detection 2019-5-06 2020-11-10 2020-11-10
System and method for threat detection and identification 2019-5-06 2021-8-03 2021-8-03
Systems and methods for testing known bad destinations in a production network 2019-4-29 2020-9-03
Dynamic guest image creation and rollback 2019-3-25 2021-7-20 2021-7-20
Cyber-security system and method for detecting escalation of privileges within … 2019-3-14 2022-4-26 2022-4-26
Method to detect application execution hijacking using memory protection 2019-2-15 2022-2-08 2022-2-08
Platform and method for retroactive reclassification employing a cybersecurity- … 2018-12-17 2022-3-08 2022-3-08
Platform and method for performing cybersecurity analyses employing an … 2018-12-17 2022-2-01 2022-2-01
Platform and Method for Enhanced Cyber-Attack Detection and Response Employing … 2018-12-17 2019-7-04
System and method for detecting malicious scripts through natural language … 2018-12-13 2021-3-23 2021-3-23
Virtualized exploit detection system 2018-12-03 2020-5-26 2020-5-26
System and method for triggering analysis of an object for malware in response … 2018-11-16 2020-12-22 2020-12-22
Correlation and consolidation holistic views of analytic data pertaining to a … 2018-11-05 2020-10-20 2020-10-20
Late load technique for deploying a virtualization layer underneath a running … 2018-10-15 2021-12-14 2021-12-14
Analytic-based security monitoring system and method 2018-10-15 2020-7-28 2020-7-28
Intelligent system for mitigating cybersecurity risk by analyzing domain name … 2018-9-28 2020-4-02
Intelligent system for mitigating cybersecurity risk by analyzing domain name … 2018-9-28 2020-4-02
System and method for bootkit detection 2018-9-27 2023-9-19 2023-9-19
System and method for detecting and remediating a cybersecurity attack 2018-9-24 2020-8-25 2020-8-25
System and method for detecting time-bomb malware 2018-9-24 2019-7-02 2019-7-02
System and method for mitigating cyberattacks against processor operability by … 2018-9-13 2021-11-23 2021-11-23
Malicious message analysis system 2018-8-13 2020-3-03 2020-3-03
System and method for improved end-to-end cybersecurity machine learning and … 2018-7-30 2022-1-18 2022-1-18
Classifying sets of malicious indicators for detecting command and control … 2018-7-23 2020-4-28 2020-4-28
System and method for verifying a cyberthreat 2018-7-23 2020-6-30 2020-6-30
System and method for detecting interpreter-based exploit attacks 2018-7-23 2021-1-05 2021-1-05
Multi-version application support and registration within a single operating … 2018-7-16 2021-12-28 2021-12-28
Malicious network content detection 2018-7-16 2020-8-25 2020-8-25
Systems and methods for generation of signature generation using interactive … 2018-7-16 2020-12-15 2020-12-15
Real-time visual playback with synchronous textual analysis log display and … 2018-7-09 2021-2-23 2021-2-23
Ransomware file modification prevention technique 2018-6-29 2021-1-12 2021-1-12
Post-intrusion detection of cyber-attacks during lateral movement within … 2018-6-29 2020-12-01 2020-12-01
Cyber-security system and method for weak indicator detection and correlation … 2018-6-29 2020-5-06
System and method for distributed cluster configuration monitoring and … 2018-6-28 2022-1-18 2022-1-18
Verification of trusted threat-aware visualization layer 2018-6-18 2022-2-08 2022-2-08
System and method for identifying phishing cyber-attacks through deep machine … 2018-6-08 2020-11-10 2020-11-10
Threat-aware architecture 2018-4-16 2020-8-11 2020-8-11
System and method for detecting exfiltration content 2018-4-02 2019-11-05 2019-11-05
Microvisor-based malware detection appliance architecture 2018-4-02 2020-1-07 2020-1-07
Attribute-controlled malware detection 2018-3-30 2020-2-05
System and method for automatically generating malware detection rule … 2018-3-30 2021-5-11 2021-5-11
System and method for predicting and mitigating cybersecurity system … 2018-3-29 2020-11-03 2020-11-03
Detection efficacy of virtual machine-based analysis with application specific … 2018-3-12 2020-1-14 2020-1-14
System and method for virtual analysis of network data 2018-3-05 2020-4-14 2020-4-14
Malicious content analysis using simulated user interaction without user … 2018-3-05 2020-11-24 2020-11-24
Dynamically adaptive framework and method for classifying malware using … 2018-3-05 2020-7-14 2020-7-14
Fuzzy hash of behavioral results 2018-3-05 2019-2-26 2019-2-26
System and method for detecting malicious links in electronic messages 2018-2-05 2019-12-10 2019-12-10
Method and system for efficient cybersecurity analysis of endpoint events 2017-12-28 2021-5-11 2021-5-11
Systems and methods for malware defense 2017-12-04 2018-10-09 2018-10-09
Intelligent context aware user interaction for malware detection 2017-12-04 2020-10-06 2020-10-06
Susceptible environment detection system 2017-11-17 2019-10-15 2019-10-15
Cyber attack early warning system 2017-11-17 2020-12-22 2020-12-22
Security cloud service framework for hardening in the field code of mobile … 2017-11-17 2019-1-15 2019-1-15
Enterprise search 2017-11-03 2020-10-06 2020-10-06
Framework For Efficient Security Coverage Of Mobile Software Applications 2017-10-16 2018-5-03
Phishing attack detection 2017-10-01 2020-10-13 2020-10-13
System and method for enforcing compliance with subscription requirements for … 2017-9-29 2020-11-24 2020-11-24
System and method for preventing malware evasion 2017-9-27 2020-8-18 2020-8-18