| 12430427 |
Methods, systems and computer programs for detecting potentially suspicious resource access events |
Daniel DAVRAEV, Shalom Shay SHAVIT |
2025-09-30 |
| 12399976 |
Agentless extraction of cloud credentials |
Josef Weizman, Lior Sonntag |
2025-08-26 |
| 12388852 |
Detecting mass control plane operations |
Andrey KARPOVSKY, Evgeny Bogokovsky |
2025-08-12 |
| 12250238 |
Threat detection using cloud resource management logs |
Roy Levin, Johnathan Samuel Simon |
2025-03-11 |
| 12041117 |
Predictive model application for file upload blocking determinations |
Omer Karin, Josef Weizman |
2024-07-16 |
| 12021882 |
Real-time detection of malicious activity through collaborative filtering |
Omer Karin |
2024-06-25 |
| 11979418 |
Detecting potential malicious use of a resource management agent using a resource management log |
Johnathan Samuel Simon |
2024-05-07 |
| 11973796 |
Dangling domain detection and access mitigation |
Josef Weizman, Aharon Naftali Michaels, Dotan Patrich |
2024-04-30 |
| 11836250 |
Identification and mitigation of permissions elevating attack vector |
Ilay Grossman |
2023-12-05 |
| 11716340 |
Threat detection using cloud resource management logs |
Roy Levin, Johnathan Samuel Simon |
2023-08-01 |
| 11651076 |
Detecting spread of malware through shared data storages |
Josef Weizman, Andrey KARPOVSKY |
2023-05-16 |
| 11647035 |
Fidelity of anomaly alerts using control plane and data plane information |
Andrey KARPOVSKY, Roy Levin, Tomer Rotstein, Michael MAKHLEVICH, Tamer Salman |
2023-05-09 |
| 11483375 |
Predictive model application for file upload blocking determinations |
Omer Karin, Josef Weizman |
2022-10-25 |
| 11416613 |
Attack detection through exposure of command abuse |
Josef Weizman, Tomer Koren, Dotan Patrich |
2022-08-16 |
| 11368473 |
Interface threat assessment in multi-cluster system |
Josef Weizman, Dotan Patrich |
2022-06-21 |
| 11363037 |
Real-time detection of malicious activity through collaborative filtering |
Omer Karin |
2022-06-14 |
| 11263544 |
Similarity based approach for clustering and accelerating multiple incidents investigation |
Yotam Livny, Roy Levin, Ben Kliger, Mathias Abraham Marc Scherman, Moshe Israel +1 more |
2022-03-01 |
| 11223637 |
Detecting attacks on web applications using server logs |
Hani Hana Neuvirth, Tomer Koren, Josef Weizman, Karl William Reinsch, Efim Hudis |
2022-01-11 |
| 11196746 |
Whitelisting of trusted accessors to restricted web pages |
Omer Karin, Hani Hana Neuvirth, Dotan Patrich, Tomer Koren, Josef Weizman +1 more |
2021-12-07 |
| 11184359 |
Automated access control policy generation for computer resources |
Ben Kliger, Yotam Livny, Roy Levin, Mathias Abraham Marc Scherman, Moshe Israel +1 more |
2021-11-23 |
| 11159567 |
Malicious cloud-based resource allocation detection |
Roy Levin |
2021-10-26 |
| 11126736 |
Protecting storage by detecting unrecommended access |
Roy Levin |
2021-09-21 |
| 11089024 |
System and method for restricting access to web resources |
Dotan Patrich, Tomer Koren, Moshe Israel, Hani Hana Neuvirth, Josef Weizman |
2021-08-10 |
| 10944791 |
Increasing security of network resources utilizing virtual honeypots |
Yotam Livny, Mathias Abraham Marc Scherman, Moshe Israel, Ben Kliger, Roy Levin +1 more |
2021-03-09 |
| 10887326 |
Distributed system for adaptive protection against web-service- targeted vulnerability scanners |
Josef Weizman, Tomer Koren, Hani Hana Neuvirth, Dotan Patrich |
2021-01-05 |