Patents Assigned to IntSights Cyber Intelligence Ltd.
-
Publication number: 20240007502Abstract: A method for defending against malicious profiles on the web comprises the steps of: i) inspecting a profile to determine its relevance to a brand that it is desired to protect from malicious activity; ii) determining whether said profile is relevant to said brand; iii) if it is determined that said profile is relevant, analyzing it to determine whether it is legitimate or malicious; and iv) if it is determined that the profile is malicious, assembling proof of its malicious activity and submitting same together with a takedown request to the administrator of the website where the profile was located.Type: ApplicationFiled: September 14, 2023Publication date: January 4, 2024Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon ARVATZ, Guy Nizan
-
Patent number: 11792178Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.Type: GrantFiled: June 9, 2022Date of Patent: October 17, 2023Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
-
Patent number: 11785044Abstract: System and method of detecting malicious interactions in a computer network, the method including generating, by a processor, at least one decoy segment, broadcasting, by the processor, the generated at least one decoy segment in a public database, monitoring, by the processor, communication within the computer network to identify interactions associated with the generated at least one decoy segment, determining, by the processor, at least one indicator of compromise (IOC) for the identified interactions, and blocking communication between the computer network and any computer associated with the determined at least one IOC.Type: GrantFiled: February 3, 2023Date of Patent: October 10, 2023Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez
-
Publication number: 20230315846Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.Type: ApplicationFiled: May 10, 2023Publication date: October 5, 2023Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel Ur
-
Publication number: 20230281306Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.Type: ApplicationFiled: May 10, 2023Publication date: September 7, 2023Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel Ur
-
Patent number: 11750649Abstract: Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.Type: GrantFiled: December 20, 2022Date of Patent: September 5, 2023Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
-
Patent number: 11693960Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.Type: GrantFiled: May 18, 2021Date of Patent: July 4, 2023Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel Ur
-
Publication number: 20230179631Abstract: System and method of detecting malicious interactions in a computer network, the method including generating, by a processor, at least one decoy segment, broadcasting, by the processor, the generated at least one decoy segment in a public database, monitoring, by the processor, communication within the computer network to identify interactions associated with the generated at least one decoy segment, determining, by the processor, at least one indicator of compromise (IOC) for the identified interactions, and blocking communication between the computer network and any computer associated with the determined at least one IOC.Type: ApplicationFiled: February 3, 2023Publication date: June 8, 2023Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez
-
Publication number: 20230126692Abstract: Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.Type: ApplicationFiled: December 20, 2022Publication date: April 27, 2023Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
-
Patent number: 11611583Abstract: System and method of detecting malicious interactions in a computer network, the method including generating, by a processor, at least one decoy segment, broadcasting, by the processor, the generated at least one decoy segment in a public database, monitoring, by the processor, communication within the computer network to identify interactions associated with the generated at least one decoy segment, determining, by the processor, at least one indicator of compromise (IOC) for the identified interactions, and blocking communication between the computer network and any computer associated with the determined at least one IOC.Type: GrantFiled: June 7, 2018Date of Patent: March 21, 2023Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez
-
Patent number: 11575707Abstract: Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.Type: GrantFiled: December 18, 2018Date of Patent: February 7, 2023Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
-
Publication number: 20220321550Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.Type: ApplicationFiled: June 9, 2022Publication date: October 6, 2022Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
-
Patent number: 11405374Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.Type: GrantFiled: March 13, 2019Date of Patent: August 2, 2022Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
-
Patent number: 11120129Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.Type: GrantFiled: January 8, 2019Date of Patent: September 14, 2021Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel Ur
-
Publication number: 20210194923Abstract: A method for defending against malicious profiles on the web comprises the steps of: i) inspecting a profile to determine its relevance to a brand that it is desired to protect from malicious activity; ii) determining whether said profile is relevant to said brand; iii) if it is determined that said profile is relevant, analyzing it to determine whether it is legitimate or malicious; and iv) if it is determined that the profile is malicious, assembling proof of its malicious activity and submitting same together with a takedown request to the administrator of the website where the profile was located.Type: ApplicationFiled: December 1, 2020Publication date: June 24, 2021Applicant: INTSIGHTS CYBER INTELLIGENCE LTDInventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
-
Publication number: 20210176274Abstract: Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.Type: ApplicationFiled: December 18, 2018Publication date: June 10, 2021Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal BEN DAVID, Amir HOZEZ, Alon ARVATZ, Guy NIZAN
-
Publication number: 20200296081Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.Type: ApplicationFiled: March 13, 2019Publication date: September 17, 2020Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal BEN DAVID, Amir Hozez, Alon Arvatz, Guy Nizan
-
Publication number: 20200218804Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.Type: ApplicationFiled: January 8, 2019Publication date: July 9, 2020Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal BEN DAVID, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel UR
-
Publication number: 20190379694Abstract: System and method of detecting malicious interactions in a computer network, the method including generating, by a processor, at least one decoy segment, broadcasting, by the processor, the generated at least one decoy segment in a public database, monitoring, by the processor, communication within the computer network to identify interactions associated with the generated at least one decoy segment, determining, by the processor, at least one indicator of compromise (IOC) for the identified interactions, and blocking communication between the computer network and any computer associated with the determined at least one IOC.Type: ApplicationFiled: June 7, 2018Publication date: December 12, 2019Applicant: IntSights Cyber Intelligence Ltd.Inventors: Gal BEN DAVID, Amir Hozez
-
Patent number: 10462180Abstract: A system and a method for mitigating phishing attacks against a secured computing device. The method may include: obtaining at least one first domain name; attributing a registration time stamp (RTS) associated with timing of a registration of the at least one domain name at a domain registrar; and configuring at least one perimeter module to restrict at least one data transmission between the secured computing device and a computing device that is associated with the first domain name, based on the RTS.Type: GrantFiled: January 9, 2019Date of Patent: October 29, 2019Assignee: IntSights Cyber Intelligence Ltd.Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan