| 12395488 |
Techniques for analyzing external exposure in cloud environments |
Matilda LIDGI, Shai Keren, Raaz HERZBERG, Ami Luttwak, Roy REZNIK |
2025-08-19 |
| 12395503 |
System and method for detecting sensitive data in active inspection of cloud computing resources |
Matilda LIDGI, Shai Keren, Raaz HERZBERG, Ami Luttwak, Roy REZNIK |
2025-08-19 |
| 12375499 |
System and method for detecting lateral movement using SSH private keys |
Ami Luttwak, Yinon COSTICA |
2025-07-29 |
| 12287899 |
Techniques for detecting sensitive data in cloud computing environments utilizing cloning |
Raaz HERZBERG, Roy REZNIK, Ami Luttwak, Moran Cohen, Yaniv Shaked +4 more |
2025-04-29 |
| 12273359 |
Lateral movement analysis using certificate private keys |
Ami Luttwak, Yinon COSTICA |
2025-04-08 |
| 12273357 |
System and method for detecting lateral movement using SSH private keys |
Ami Luttwak, Yinon COSTICA |
2025-04-08 |
| 12273358 |
System and method for detecting lateral movement using cloud access keys |
Ami Luttwak, Daniel Hershko SHEMESH |
2025-04-08 |
| 12267326 |
Techniques for detecting resources without authentication using exposure analysis |
Matilda LIDGI, Shai Keren, Raaz HERZBERG, Ami Luttwak, Roy REZNIK |
2025-04-01 |
| 12255900 |
System and method for detecting lateral movement using cloud access keys |
Ami Luttwak, Daniel Hershko SHEMESH |
2025-03-18 |
| 12250231 |
System and method for detecting lateral movement using cloud access keys |
Ami Luttwak, Daniel Hershko SHEMESH |
2025-03-11 |
| 12250230 |
Lateral movement analysis using certificate private keys |
Ami Luttwak, Yinon COSTICA |
2025-03-11 |
| 12244627 |
Techniques for active inspection of vulnerability exploitation using exposure |
Matilda LIDGI, Shai Keren, Raaz HERZBERG, Ami Luttwak, Roy REZNIK |
2025-03-04 |
| 12231440 |
System and method for detecting lateral movement using cloud access keys |
Ami Luttwak, Daniel Hershko SHEMESH |
2025-02-18 |
| 12182172 |
System and method for agentless detection of sensitive data on managed databases |
Raaz HERZBERG, Roy REZNIK, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more |
2024-12-31 |
| 12166778 |
Techniques for incident response and static analysis representation in computing environments |
Alma Raziel, George PISHA, Michael Aminov, Tal Gilady, Amitai Cohen |
2024-12-10 |
| 12095776 |
Lateral movement analysis using certificate private keys |
Ami Luttwak, Yinon COSTICA |
2024-09-17 |
| 12095777 |
System and method for detecting lateral movement using SSH private keys |
Ami Luttwak, Yinon COSTICA |
2024-09-17 |
| 12061719 |
System and method for agentless detection of sensitive data in computing environments |
Raaz HERZBERG, Roy REZNIK, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more |
2024-08-13 |
| 11949690 |
System and method for detecting lateral movement using SSH private keys |
Ami Luttwak, Yinon COSTICA |
2024-04-02 |
| 11916926 |
Lateral movement analysis using certificate private keys |
Ami Luttwak, Yinon COSTICA |
2024-02-27 |
| 11811787 |
System and method for detecting lateral movement using cloud access keys |
Ami Luttwak, Daniel Hershko SHEMESH |
2023-11-07 |
| 11811786 |
Lateral movement analysis using certificate private keys |
Ami Luttwak, Yinon COSTICA |
2023-11-07 |
| 11799874 |
System and method for detecting lateral movement using SSH private keys |
Ami Luttwak, Yinon COSTICA |
2023-10-24 |