Patents by Inventor Ronen Segal

Ronen Segal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230264044
    Abstract: A device for treating a tumor, including a needle for insertion into the tumor, a solution generator configured to generate a liquid solution including free radionuclides at a concentration of at least 1*106 atoms per microliter, and a pump which continuously pumps the generated solution into the needle.
    Type: Application
    Filed: February 23, 2023
    Publication date: August 24, 2023
    Inventors: Lior Arazi, Itzhak Kelson, Ronen Segal, Raphael Aryeh Levy
  • Publication number: 20230191157
    Abstract: A system includes a memory, configured to store program instructions, and a processor. The processor is configured to load the program instructions from the memory, and by executing the program instructions, to process a three-dimensional image of a portion of a body of a subject in which multiple brachytherapy to identify clusters of voxels of the image corresponding to the seed groups, respectively, to compute respective estimated positions of the brachytherapy seeds based on respective dimensions of each of the clusters, and to store or communicate the estimated positions for use in computing an effective dose of the brachytherapy seeds. Other embodiments are also described.
    Type: Application
    Filed: November 30, 2022
    Publication date: June 22, 2023
    Inventors: Ilay Kamai, Ronen Segal, Yadin Cohen, Amnon Gat
  • Patent number: 11582256
    Abstract: Methods and systems for penetration testing of a networked system involve assigning network nodes to disjoint classes based on current information about the compromisability of the network nodes. The classes distinguish between nodes not currently known to be compromisable, nodes that only recently have become known to be compromisable, e.g., by a first method of a attack, and nodes that have been known for a longer time to be compromisable. Nodes that only recently have become known to be compromisable can be re-targeted by the penetration testing system to determine whether such nodes can be compromised using multiple methods of attack and not just using the first method of attack.
    Type: Grant
    Filed: November 16, 2020
    Date of Patent: February 14, 2023
    Assignee: XM Cyber Ltd.
    Inventors: Yarden Moskovich, Ronen Segal, Boaz Gorodissky
  • Patent number: 11400289
    Abstract: Apparatus and methods are described for use with electrophysiological signal detecting electrodes, and a transcranial magnetic stimulation device. A computer processor drives the transcranial stimulation device to apply one or more pulses of transcranial magnetic stimulation to a subject. Within a given time period of applying one of the one or more pulses of transcranial magnetic stimulation to the subject, the computer processor detects an electrophysiological signal of the subject, using the electrophysiological signal detecting electrodes. At least partially in response thereto, the computer processor predicts an outcome of treating the subject for a neuropsychiatric condition, using a given therapy, and generates an output on an output device in response to the predicted outcome. Other applications are also described.
    Type: Grant
    Filed: October 25, 2017
    Date of Patent: August 2, 2022
    Assignees: BRAINSWAY LTD., ELMINDA LTD., B. G. NEGEV TECHNOLOGIES AND APPLICATIONS LTD.
    Inventors: Uri Alyagon, Abraham Zangen, Gaby S. Pell, Yiftach Roth, Ronen Segal, Amir Geva, Ziv Peremen, Boaz Sadeh, Revital Shani-Hershkovich, Dror Haor
  • Patent number: 11283827
    Abstract: A method for executing a penetration testing campaign comprises performing a determination of conditional compromisability for one or more network nodes, including examining each given network node of the one or more network nodes to determine whether it can be compromised from a network node that is already determined to be compromisable and that can communicate with the given network node to the extent required for exploiting a vulnerability applicable to the given network node. Subsequently, for a selected target network node determined to be conditionally compromisable, a potential attacking node is selected from the already-determined-to-be-compromisable nodes and a check is made whether the selected potential attacking network node can communicate with the selected target network node to the extent required, thus leading to a determination that the selected target network node is not only conditionally compromisable but also actually compromisable by an attacker.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: March 22, 2022
    Assignee: XM CYBER LTD.
    Inventors: Ronen Segal, Yaron Shani
  • Patent number: 11206281
    Abstract: Carrying out a penetration testing campaign in a networked system by a penetration testing system, for determining a way for an attacker to compromise the networked system, comprises determining that the attacker can obtain user credentials of a first user, determining that when using the user credentials the first user has access rights to a first network node of the networked system, determining that a second network node of the networked system is compromisable by the attacker during the penetration testing campaign, determining that the first network node was accessed from the second network node, and based on the foregoing, determining that the first network node is compromisable by the attacker during the penetration testing campaign, and determining the way for the attacker to compromise the networked system which includes a step of compromising the first network node using the user credentials of the first user.
    Type: Grant
    Filed: April 2, 2020
    Date of Patent: December 21, 2021
    Assignee: XM Cyber Ltd.
    Inventors: Ronen Segal, Yaron Shani, Igal Gofman
  • Patent number: 11206282
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Grant
    Filed: December 24, 2020
    Date of Patent: December 21, 2021
    Assignee: XM Cyber Ltd.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal, Menahem Lasser
  • Publication number: 20210314341
    Abstract: Methods and systems for penetration testing of a networked system involve assigning network nodes to disjoint classes based on current information about the compromisability of the network nodes. The classes distinguish between nodes not currently known to be compromisable, nodes that only recently have become known to be compromisable, e.g., by a first method of a attack, and nodes that have been known for a longer time to be compromisable. Nodes that only recently have become known to be compromisable can be re-targeted by the penetration testing system to determine whether such nodes can be compromised using multiple methods of attack and not just using the first method of attack.
    Type: Application
    Filed: November 16, 2020
    Publication date: October 7, 2021
    Inventors: Yarden Moskovich, Ronen Segal, Boaz GORODISSKY
  • Publication number: 20210226984
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Application
    Filed: December 24, 2020
    Publication date: July 22, 2021
    Inventors: Boaz GORODISSKY, Adi ASHKENAZY, Ronen SEGAL, Menahem LASSER
  • Patent number: 10999308
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system (e.g. that is controlled by a user interface of a computing device) are disclosed herein. In one example, a penetration testing campaign is executed according to a manual and explicit selecting of one or more goals of an attacker of the penetration testing campaign. Alternatively or additionally, a penetration testing campaign is executed according to an automatic selecting of of one or more goals of the attacker (e.g. according to a type of attacker of the penetration testing campaign).
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: May 4, 2021
    Assignee: XM Cyber Ltd.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal
  • Patent number: 10911476
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: February 2, 2021
    Assignee: XM CYBER LTD.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal, Menahem Lasser
  • Publication number: 20200358805
    Abstract: Carrying out a penetration testing campaign in a networked system by a penetration testing system, for determining a way for an attacker to compromise the networked system, comprises determining that the attacker can obtain user credentials of a first user, determining that when using the user credentials the first user has access rights to a first network node of the networked system, determining that a second network node of the networked system is compromisable by the attacker during the penetration testing campaign, determining that the first network node was accessed from the second network node, and based on the foregoing, determining that the first network node is compromisable by the attacker during the penetration testing campaign, and determining the way for the attacker to compromise the networked system which includes a step of compromising the first network node using the user credentials of the first user.
    Type: Application
    Filed: April 2, 2020
    Publication date: November 12, 2020
    Inventors: Ronen SEGAL, Yaron SHANI, Igal GOFMAN
  • Publication number: 20200280577
    Abstract: A method for executing a penetration testing campaign comprises performing a determination of conditional compromisability for one or more network nodes, including examining each given network node of the one or more network nodes to determine whether it can be compromised from a network node that is already determined to be compromisable and that can communicate with the given network node to the extent required for exploiting a vulnerability applicable to the given network node. Subsequently, for a selected target network node determined to be conditionally compromisable, a potential attacking node is selected from the already-determined-to-be-compromisable nodes and a check is made whether the selected potential attacking network node can communicate with the selected target network node to the extent required, thus leading to a determination that the selected target network node is not only conditionally compromisable but also actually compromisable by an attacker.
    Type: Application
    Filed: December 16, 2019
    Publication date: September 3, 2020
    Inventors: Ronen SEGAL, Yaron SHANI
  • Publication number: 20200236130
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Application
    Filed: March 27, 2020
    Publication date: July 23, 2020
    Inventors: Boaz GORODISSKY, Adi ASHKENAZY, Ronen SEGAL, Menahem LASSER
  • Patent number: 10686822
    Abstract: Methods and systems for carrying out campaigns of penetration testing for discovering and reporting security vulnerabilities of a networked system, the networked system comprising a plurality of network nodes interconnected by one or more networks.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: June 16, 2020
    Assignee: XM Cyber Ltd.
    Inventor: Ronen Segal
  • Patent number: 10686823
    Abstract: Methods and systems for carrying out campaigns of penetration testing for discovering and reporting security vulnerabilities of a networked system, the networked system comprising a plurality of network nodes interconnected by one or more networks.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: June 16, 2020
    Assignee: XM Cyber Ltd.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal
  • Publication number: 20200153852
    Abstract: Methods and systems of testing for phishing security vulnerabilities are disclosed, including methods of penetration testing of a network node by a penetration testing system comprising a reconnaissance agent software module installed in the network node, and a penetration testing software module installed on a remote computing device. Penetration testing systems are provided so as to locally detect weaknesses that would expose network nodes to phishing-based attacks.
    Type: Application
    Filed: January 9, 2020
    Publication date: May 14, 2020
    Inventors: Ronen SEGAL, Menahem LASSER
  • Patent number: 10652269
    Abstract: Penetration testing campaigns generate remediation recommendations based at least in part on information about files stored in network nodes of the tested networked system. Information is obtained about files stored in a plurality of network nodes of the networked system, and based on the obtained information, a corresponding data-value score for each network node of the plurality of network nodes is determined according to a common data-value metric. The penetration testing campaign is executed, following which one or more remediation recommendations are selected based on the data-value scores corresponding to at least some of the plurality of network nodes.
    Type: Grant
    Filed: September 23, 2019
    Date of Patent: May 12, 2020
    Assignee: XM Cyber Ltd.
    Inventors: Ronen Segal, Menahem Lasser
  • Publication number: 20200145449
    Abstract: Penetration testing campaigns generate remediation recommendations based at least in part on information about files stored in network nodes of the tested networked system. Information is obtained about files stored in a plurality of network nodes of the networked system, and based on the obtained information, a corresponding data-value score for each network node of the plurality of network nodes is determined according to a common data-value metric. The penetration testing campaign is executed, following which one or more remediation recommendations are selected based on the data-value scores corresponding to at least some of the plurality of network nodes.
    Type: Application
    Filed: September 23, 2019
    Publication date: May 7, 2020
    Inventors: Ronen SEGAL, Menahem LASSER
  • Patent number: 10645113
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Grant
    Filed: September 11, 2019
    Date of Patent: May 5, 2020
    Assignee: XM Cyber Ltd.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal, Menahem Lasser