Patents Assigned to CYBER SECDO LTD.
  • Patent number: 10270805
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: April 23, 2019
    Assignee: CYBER SECDO LTD.
    Inventors: Gil Barak, Shai Morag
  • Publication number: 20180373870
    Abstract: A computerized method for logical identification of malicious threats across a plurality of end-point devices (EPD) communicatively connected by a network, comprising collecting over the network an identifier associated with each file of a plurality of files, wherein each file of the plurality of files is installed on at least one of the plurality of EPDs and wherein the identifier is the same for each like file of the plurality of file. Information associated with an identified subset of files is collected, wherein the information indicates at least a time at which the at least one file was installed on one or more of the plurality of EPDs and the way the at least one file spread within the network. The collected information is analyzed according to a set of predetermined computerized investigation rules. The analysis is used to determine whether at least a file of the identified subset files is a suspicious file.
    Type: Application
    Filed: June 21, 2018
    Publication date: December 27, 2018
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20180115564
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Application
    Filed: December 12, 2017
    Publication date: April 26, 2018
    Applicant: CYBER SECDO LTD.
    Inventors: Gil BARAK, Shai MORAG
  • Patent number: 9888031
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: February 6, 2018
    Assignee: CYBER SECDO LTD.
    Inventors: Gil Barak, Shai Morag
  • Publication number: 20170308711
    Abstract: A computerized method for preventing ransomware from encrypting data elements stored in a memory of a computer-based system, the method comprising identifying at least one identifier for a data element, wherein the at least one identifier indicates at least a position of the data element within the memory. An optimal number of virtual traps is determined for the data element corresponding to the at least one identifier. An optimal position for each of the virtual traps is determined corresponding to the at least one identifier. The virtual traps are send to the determined optimal position within the memory.
    Type: Application
    Filed: April 20, 2017
    Publication date: October 26, 2017
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20170286683
    Abstract: A computerized method for identification of suspicious processes executing on an end-point device communicatively connected to network, the network communicatively connected to a server, the method comprising receiving, by the server, a record of at least one process, initiated by and executing on by the end-point device. One or more parameters associated with the at least one process are identified. A first time pointer is identified corresponding to the identified one or more parameters, a first time pointer. A second time pointer at which a user associated with the end-point device initiated a user dependent process is identified. Whether the second time pointer occurred before the first time pointer is identified. It is determined whether the at least one process was initiated by the user based on identification of user dependent processes and corresponding attribution. An action is performed based on the above determination.
    Type: Application
    Filed: April 3, 2017
    Publication date: October 5, 2017
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20170206358
    Abstract: A system is used for detection of advanced persistent and non-persistent threats in a computerized environment. The system is connected to a plurality of user devices coupled to an enterprise's network. The system receives via an interface an electronic notification of at least one event in the operating system of the computer. The system then analyzes the at least one event. The system then generates a causality chain for the at least one event respective of the analysis. The causality chain comprises all the threads that attributed to the at least one event in a chronological order. The system then identifies a main thread that started the causality chain that led to the at least one event. Then, the system determines whether the main thread is associated with malicious software. Upon determination that the main thread is associated with malicious software, the causality chain is marked as infected.
    Type: Application
    Filed: January 12, 2017
    Publication date: July 20, 2017
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20170195350
    Abstract: A system is used for detection of advanced persistent and non-persistent threats in a computerized environment. The system is connected to a plurality of user devices coupled to an enterprise's network. The system receives via an interface an electronic notification of at least one event in the operating system of the computer. The system then analyzes the at least one event. The system then generates a causality chain for the at least one event respective of the analysis. The causality chain comprises all the threads that attributed to the at least one event in a chronological order. The system then identifies a main thread that started the causality chain that led to the at least one event. Then, the system determines whether the main thread is associated with malicious software. Upon determination that the main thread is associated with malicious software, the causality chain is marked as infected.
    Type: Application
    Filed: January 4, 2017
    Publication date: July 6, 2017
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20160149938
    Abstract: A system, an apparatus, and a method thereof identifies at least one security threat in an enterprise's network. The system characterizes sources affected by the security threat within the enterprise's network. The identification of the sources affected by the security threat is made based on the forensic data extracted by the system. The system then suspends the affected sources. The system also stores the affected sources in a separate memory to prevent execution thereof.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 26, 2016
    Applicant: CYBER SECDO LTD.
    Inventors: Gil BARAK, Shai MORAG