Patents Assigned to Expel, Inc.
-
Publication number: 20250103710Abstract: A system and method for generating a digital cybersecurity artifact includes selectively executing an automated cybersecurity investigation workflow based on a probable cybersecurity threat type of a cybersecurity event, wherein an output of the automated cybersecurity investigation workflow includes one or more corpora of investigation findings data in response to executing the automated cybersecurity investigation workflow; selectively instantiating a digital cybersecurity artifact of a plurality of digital cybersecurity artifacts based on the probable cybersecurity threat type of the cybersecurity event, wherein the digital cybersecurity artifact includes a plurality of distinct regions electronically mapped to one or more threat type-specific content automations that, when executed, install investigation findings data into the plurality of distinct regions of the plurality of distinct regions of the digital cybersecurity artifact with selective subsets of investigation findings data of the one or more corType: ApplicationFiled: December 5, 2024Publication date: March 27, 2025Applicant: Expel, Inc.Inventors: Jonathan Hencinski, Emily Garton, Jasper Tom, Pat Conley, David Spigarelli, Roger Studner
-
Publication number: 20250088534Abstract: A system and method for accelerating a disposition of non-malicious electronic communications includes extracting one or more corpora of feature vectors from an electronic communication based on providing the electronic communication as input to a feature extractor; computing, by a machine learning-based electronic communication classification model, an electronic communication-type classification inference that includes a probability of the electronic communication being of the target non-malicious electronic communication type in response to the machine learning-based electronic communication classification model receiving the one or more corpora of feature vectors; attributing a classification label of the target non-malicious electronic communication type to the electronic communication based on the probability of the electronic communication-type classification inference satisfying a minimum electronic communication classification threshold; and automatically routing a security alert associated with theType: ApplicationFiled: September 13, 2024Publication date: March 13, 2025Applicant: Expel, Inc.Inventors: Elisabeth Weber, Jane Hung
-
Publication number: 20250080553Abstract: A system, method, and computer-program product includes executing a computer-executable threat hunting protocol for autonomously assessing digital activity data associated with one or more environments of a subscriber, wherein executing the computer-executable threat hunting protocol includes: executing the at least one behavioral sequence model to output an initial set of likely suspicious digital activity that occurred within the one or more environments, assessing the initial set of likely suspicious digital activity outputted by the at least one behavioral sequence model against the at least one auxiliary enrichment dataset to identify a subset of the initial set of likely suspicious digital activity that is not suspicious, and outputting a refined set of suspicious digital activity by removing the subset of the initial set of likely suspicious digital activity from the initial set of likely suspicious digital activity, and surfacing, via a user interface, the refined set of suspicious digital activity.Type: ApplicationFiled: August 29, 2024Publication date: March 6, 2025Applicant: Expel, Inc.Inventors: Bryan Geraldo, Nathan Sorrel
-
Publication number: 20250071152Abstract: A system and method for deploying cybersecurity resources includes sourcing cybersecurity operations data that includes a plurality of distinct datasets derived from a handling of a target cybersecurity event; extracting, from the cybersecurity operations data, at least cybersecurity task feature data relating to a plurality of cybersecurity tasks and metadata, wherein each cybersecurity task of the plurality of cybersecurity tasks includes an identification of an operation executed when handling or the target cybersecurity event and an identification of an operator executing the operation; deriving timestamp data for each operation executed by a respective operator of each respective cybersecurity task of the plurality of cybersecurity tasks instantiating, by computer processors, a cybersecurity event data structure; using entries of the cybersecurity event data structure to compute allocation values for cybersecurity resources for handling impending cybersecurity events; and deploying, within a security opeType: ApplicationFiled: November 13, 2024Publication date: February 27, 2025Applicant: Expel, Inc.Inventors: Jane Hung, Elisabeth Weber
-
Publication number: 20250036765Abstract: A system, method, and computer-program product includes obtaining a third-party security event of a subscriber, generating a technology source-agnostic security event signal for the third-party security event based on routing the third-party security event to an event normalization service, identifying a technology source-agnostic security event signal type that corresponds to the technology source-agnostic security event signal based on generating the technology source-agnostic security event signal, retrieving a corpus of computer-executable detection instructions digitally mapped to the technology source-agnostic security event signal type based on querying a detection instructions retrieval application programming interface (API), assessing the technology source-agnostic security event signal against each computer-executable detection instruction included in the corpus of computer-executable detection instructions, and generating, via the one or more processors, a prospective security alert based on the tType: ApplicationFiled: August 2, 2024Publication date: January 30, 2025Applicant: Expel, Inc.Inventors: Dan Whalen, Patrick Edgett
-
Publication number: 20250039229Abstract: A system and method for accelerating a threat mitigation of malicious cybersecurity activity includes: identifying, via one or more processors, a cybersecurity event associated with a third-party application or a third-party service of a subscriber; generating, via the one or more processors, a service-proposed remediation action for the cybersecurity event based on the identifying of the cybersecurity event; automatically assessing, via the one or more processors, the service-proposed remediation action against automated remediation criteria of the subscriber based on the generation of the service-proposed remediation action; automatically constructing, via the one or more processors, a remediation action application programming interface (API) request for the service-proposed remediation action based on the service-proposed remediation action satisfying the automated remediation criteria of the subscriber; and automatically executing, via the one or more processors, the remediation action API request to remType: ApplicationFiled: February 29, 2024Publication date: January 30, 2025Applicant: Expel, Inc.Inventor: Nabeel Zafar
-
Patent number: 12197570Abstract: A system and method for generating a digital cybersecurity artifact includes selectively executing an automated cybersecurity investigation workflow based on a probable cybersecurity threat type of a cybersecurity event, wherein an output of the automated cybersecurity investigation workflow includes one or more corpora of investigation findings data in response to executing the automated cybersecurity investigation workflow; selectively instantiating a digital cybersecurity artifact of a plurality of digital cybersecurity artifacts based on the probable cybersecurity threat type of the cybersecurity event, wherein the digital cybersecurity artifact includes a plurality of distinct regions electronically mapped to one or more threat type-specific content automations that, when executed, install investigation findings data into the plurality of distinct regions of the plurality of distinct regions of the digital cybersecurity artifact with selective subsets of investigation findings data of the one or more corType: GrantFiled: December 20, 2023Date of Patent: January 14, 2025Assignee: Expel, Inc.Inventors: Jonathan Hencinski, Emily Garton, Jasper Tom, Pat Conley, David Spigarelli, Roger Studner
-
Publication number: 20240430276Abstract: A system, method, and computer-program product includes displaying, via a data integration building user interface, a plurality of integration-identifying user interface input elements configured to receive one or more strings of text for specifying a set of integration identification parameters that characterize an in-development security integration for a third-party security service, displaying, via the data integration building user interface, a signal-specific data mapping container based on receiving an input selecting a signal mapping addition control button of the data integration building user interface, displaying, via the data integration building user interface, a raw event simulation container based on receiving an input selecting a simulation addition control button of the data integration building user interface, and displaying, via the data integration building user interface, an integration deployment control element that, when operated, transitions the in-development security integration toType: ApplicationFiled: June 20, 2024Publication date: December 26, 2024Applicant: Expel, Inc.Inventors: Dan Whalen, Patrick Edgett, Issa Hafiri, Ashwin Ramesh, Andrew Pritchett, Sam Chiou, Joseph Rodriguez, Dave Walk, Max Timmons, Matt Dean
-
Patent number: 12177265Abstract: A system and method for deploying cybersecurity resources includes sourcing cybersecurity operations data that includes a plurality of distinct datasets derived from a handling of a target cybersecurity event; extracting, from the cybersecurity operations data, at least cybersecurity task feature data relating to a plurality of cybersecurity tasks and metadata, wherein each cybersecurity task of the plurality of cybersecurity tasks includes an identification of an operation executed when handling or the target cybersecurity event and an identification of an operator executing the operation; deriving timestamp data for each operation executed by a respective operator of each respective cybersecurity task of the plurality of cybersecurity tasks instantiating, by computer processors, a cybersecurity event data structure; using entries of the cybersecurity event data structure to compute allocation values for cybersecurity resources for handling impending cybersecurity events; and deploying, within a security opeType: GrantFiled: May 20, 2024Date of Patent: December 24, 2024Assignee: Expel, Inc.Inventors: Jane Hung, Elisabeth Weber
-
Publication number: 20240414194Abstract: A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.Type: ApplicationFiled: August 21, 2024Publication date: December 12, 2024Applicant: Expel, Inc.Inventors: Matt Peters, Peter Silberman, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman
-
Publication number: 20240414198Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of disType: ApplicationFiled: August 22, 2024Publication date: December 12, 2024Applicant: Expel, Inc.Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
-
Publication number: 20240388608Abstract: A system and method for deploying cybersecurity resources includes sourcing cybersecurity operations data that includes a plurality of distinct datasets derived from a handling of a target cybersecurity event; extracting, from the cybersecurity operations data, at least cybersecurity task feature data relating to a plurality of cybersecurity tasks and metadata, wherein each cybersecurity task of the plurality of cybersecurity tasks includes an identification of an operation executed when handling or the target cybersecurity event and an identification of an operator executing the operation; deriving timestamp data for each operation executed by a respective operator of each respective cybersecurity task of the plurality of cybersecurity tasks instantiating, by computer processors, a cybersecurity event data structure; using entries of the cybersecurity event data structure to compute allocation values for cybersecurity resources for handling impending cybersecurity events; and deploying, within a security opeType: ApplicationFiled: May 20, 2024Publication date: November 21, 2024Applicant: Expel, Inc.Inventors: Jane Hung, Elisabeth Weber
-
Patent number: 12120147Abstract: A system and method for accelerating a disposition of non-malicious electronic communications includes extracting one or more corpora of feature vectors from an electronic communication based on providing the electronic communication as input to a feature extractor; computing, by a machine learning-based electronic communication classification model, an electronic communication-type classification inference that includes a probability of the electronic communication being of the target non-malicious electronic communication type in response to the machine learning-based electronic communication classification model receiving the one or more corpora of feature vectors; attributing a classification label of the target non-malicious electronic communication type to the electronic communication based on the probability of the electronic communication-type classification inference satisfying a minimum electronic communication classification threshold; and automatically routing a security alert associated with theType: GrantFiled: March 16, 2024Date of Patent: October 15, 2024Assignee: Expel, Inc.Inventors: Elisabeth Weber, Jane Hung
-
Publication number: 20240333508Abstract: A system and method for using digitally signed web tokens to securely share sensitive data includes identifying an API request that includes an authorization header comprising authentication data; assessing the authentication data of the API request against a corpus of valid authentication data; identifying the authentication data as valid authentication data and a target entity that corresponds to the authentication data; obtaining a set of permissions associated with the target entity; generating a digitally signed protobuf web token that includes a representation of the target entity and a representation of the set of permissions associated with the target entity; and based on the generation of the digitally signed protobuf web token: adapting the API request to an adapted API request that includes a header component comprising the digitally signed protobuf web token; and transmitting the adapted API request to a target API-processing service.Type: ApplicationFiled: June 13, 2024Publication date: October 3, 2024Applicant: Expel, Inc.Inventor: Matthew Blasius
-
Patent number: 12107886Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of disType: GrantFiled: October 20, 2022Date of Patent: October 1, 2024Assignee: Expel, Inc.Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
-
Patent number: 12101348Abstract: A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.Type: GrantFiled: April 11, 2023Date of Patent: September 24, 2024Assignee: Expel, Inc.Inventors: Matt Peters, Peter Silberman, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman
-
Patent number: 12052364Abstract: A system and method for using digitally signed web tokens to securely share sensitive data includes identifying an API request that includes an authorization header comprising authentication data; assessing the authentication data of the API request against a corpus of valid authentication data; identifying the authentication data as valid authentication data and a target entity that corresponds to the authentication data; obtaining a set of permissions associated with the target entity; generating a digitally signed protobuf web token that includes a representation of the target entity and a representation of the set of permissions associated with the target entity; and based on the generation of the digitally signed protobuf web token: adapting the API request to an adapted API request that includes a header component comprising the digitally signed protobuf web token; and transmitting the adapted API request to a target API-processing service.Type: GrantFiled: December 19, 2023Date of Patent: July 30, 2024Assignee: Expel, Inc.Inventor: Matthew Blasius
-
Publication number: 20240223582Abstract: A system and method for adapting one or more cybersecurity microservices to accelerate cybersecurity threat mitigation includes constructing a subscriber-specific data corpus comprising a plurality of distinct pieces of computing environment-informative data of a target subscriber; adapting a subscriber-agnostic microservice of the cybersecurity service to a subscriber-specific microservice, wherein: the subscriber-agnostic microservice includes a plurality of subscriber-agnostic cybersecurity event handling instructions, and adapting the subscriber-agnostic microservice to the subscriber-specific microservice includes generating a plurality of context-informed cybersecurity event handling instructions; augmenting the subscriber-agnostic microservice to include the plurality of context-informed cybersecurity event handling instructions; computing for a target cybersecurity event a subscriber-specific threat severity level based on one or more of the plurality of context-informed cybersecurity event handling iType: ApplicationFiled: February 15, 2024Publication date: July 4, 2024Applicant: Expel, Inc.Inventors: Patrick Duffy, Kelsey Mitchell, Peter Silberman
-
Publication number: 20240223607Abstract: A system and method for accelerating a disposition of non-malicious electronic communications includes extracting one or more corpora of feature vectors from an electronic communication based on providing the electronic communication as input to a feature extractor; computing, by a machine learning-based electronic communication classification model, an electronic communication-type classification inference that includes a probability of the electronic communication being of the target non-malicious electronic communication type in response to the machine learning-based electronic communication classification model receiving the one or more corpora of feature vectors; attributing a classification label of the target non-malicious electronic communication type to the electronic communication based on the probability of the electronic communication-type classification inference satisfying a minimum electronic communication classification threshold; and automatically routing a security alert associated with theType: ApplicationFiled: March 16, 2024Publication date: July 4, 2024Applicant: Expel, Inc.Inventors: Elisabeth Weber, Jane Hung
-
Patent number: D1037286Type: GrantFiled: May 26, 2022Date of Patent: July 30, 2024Assignee: Expel, Inc.Inventor: Kelsey Mitchell