Techniques for active inspection of vulnerability exploitation using exposure analysis

M Lidgi, S Keren, R Herzberg… - US Patent App. 17 …, 2023 - Google Patents
US20230336578A1 - Techniques for active inspection of vulnerability exploitation using
exposure analysis - Google Patents US20230336578A1 - Techniques for active inspection of …

Techniques for detecting resources without authentication using exposure analysis

M Lidgi, S Keren, R Herzberg… - US Patent App. 17 …, 2023 - Google Patents
US20230336550A1 - Techniques for detecting resources without authentication using exposure
analysis - Google Patents US20230336550A1 - Techniques for detecting resources without …

System and method for agentless detection of sensitive data in computing environments

R Herzberg, AT Lichtenstein, R Reznik… - US Patent App. 18 …, 2024 - Google Patents
A system and method for agentless detection of sensitive data in a cloud computing
environment. The method includes detecting a first data object including a data schema and …

Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity

S Rand, E Abramov, Y Shaked… - US Patent App. 18 …, 2024 - Google Patents
A system and method reduces use of restricted operations in a cloud computing
environment during cybersecurity threat inspection. The method includes: detecting an …

Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources

DH Shemesh, Y Miran, R Reznik, A Luttwak… - US Patent App. 18 …, 2024 - Google Patents
A system and method for detecting cybersecurity risk on a resource in a computing
environment utilizes static analysis of a cloned resource and runtime data from the live …

System and method for encrypted disk inspection utilizing disk cloning techniques

DH Shemesh, Y Miran, R Reznik, A Luttwak… - US Patent …, 2024 - Google Patents
A system and method for inspecting encrypted disks for a cybersecurity object using a
custom key are disclosed. The method includes detecting an encrypted disk in a cloud …

Techniques for encrypted disk cybersecurity inspection utilizing disk cloning

DH Shemesh, Y Miran, R Reznik… - US Patent …, 2025 - freepatentsonline.com
A system and method for inspecting encrypted disks for a cybersecurity object using a
generic key is disclosed. The method includes: detecting an encrypted disk in a cloud …

Detecting security exceptions across multiple compute environments

DH Shemesh, Y Miran, R Reznik, A Luttwak… - US Patent App. 18 …, 2024 - Google Patents
A system and method for applying cybersecurity policies across multiple computing
environments is presented. The method includes: generating an inspectable disk from a disk …

Detecting and preventing botnet attacks using client-specific event payloads

VK Yarabolu - US Patent App. 17/680,937, 2023 - Google Patents
one or more aspects of the disclosure relate to map** client-specific events using alpha-
numeric event codes and alpha-numeric user interface codes, generating client-specific …

Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity

S Rand, E Abramov, Y Shaked… - US Patent …, 2024 - freepatentsonline.com
A system and method reduces use of restricted operations in a cloud computing
environment during cybersecurity threat inspection. The method includes: detecting an …