Patents Assigned to Wiz, Inc.
-
Patent number: 12271485Abstract: A system and method for detecting a vulnerable workload deployed in a cloud environment based on a code object of an infrastructure as code file utilizes a security graph. The method includes: extracting the code object from a state file, which includes a mapping between the code object to a first deployed workload and a second deployed workload; generating a node representing the code object in the security graph; generating a connection in the security graph between the node representing the code object and a node representing the first workload and a connection between the node representing the code object and a node representing the second workload; and determining that the second workload is a vulnerable workload, in response to detecting that the first workload node is associated with a cybersecurity threat, and that the nodes representing the workloads are each connected to the node representing the code object.Type: GrantFiled: August 17, 2022Date of Patent: April 8, 2025Assignee: Wiz, Inc.Inventors: Roy Reznik, Yinon Costica, Osher Hazan, Raaz Herzberg
-
Patent number: 12273359Abstract: A system and method for detecting potential lateral movement in a cloud computing environment includes detecting a private encryption key and a certificate, each of which further include a hash value of a respective public key, wherein the certificate is stored on a first resource deployed in the cloud computing environment; generating in a security graph: a private key node, a certificate node, and a resource node connected to the certificate node, wherein the security graph is a representation of the cloud computing environment; generating a connection in the security graph between the private key node and the certificate node, in response to determining a match between the hash values of the public key of the private key and the public key of the certificate; and determining that the first resource node is potentially compromised, in response to receiving an indication that an element of the public key is compromised.Type: GrantFiled: September 18, 2024Date of Patent: April 8, 2025Assignee: Wiz, Inc.Inventors: Avi Tal Lichtenstein, Ami Luttwak, Yinon Costica
-
Patent number: 12273357Abstract: A system and method for detecting lateral movement based on an exposed cryptographic network protocol (CNP) key in a cloud computing environment. The method includes: inspecting a first workload for a private CNP key, the private CNP key associated with a hash of a public CNP key; detecting in a security database a representation of the public CNP key; generating a lateral movement path, the lateral movement path including an identifier of a second workload, the second workload represented by a representation connected to the representation of the public CNP key.Type: GrantFiled: September 18, 2024Date of Patent: April 8, 2025Assignee: Wiz, Inc.Inventors: Avi Tal Lichtenstein, Ami Luttwak, Yinon Costica
-
Patent number: 12273370Abstract: A system and method for detecting a combined cybersecurity risk for an artificial intelligence (AI) model is presented. The method includes: inspecting a computing environment for an AI model deployed therein; generating a representation of the AI model in a security database, the security database including a representation of the computing environment; detecting a first cybersecurity risk respective of the AI model; inspecting the computing environment for a cybersecurity object; determining that the AI model is exposed to a toxic combination cybersecurity risk based on the detected first cybersecurity risk and the cybersecurity object; and initiating a mitigation action based on the toxic combination cybersecurity risk.Type: GrantFiled: May 23, 2024Date of Patent: April 8, 2025Assignee: Wiz, Inc.Inventors: Amitai Cohen, Barak Sharoni, Alon Schindel, Alon Weiss, Itay Arbel, George Pisha, Maayan Laav, Liron Levin
-
Patent number: 12273391Abstract: A method and system for modeling a cloud environment as a security graph are provided. The method includes identifying security objects in the cloud environment; collecting object data of the identified security objects; constructing security graph based on collected object data of the identified security objects; determining relationships among the identified security objects, wherein the relationships are determined based on the collected object data of the identified security objects and using a static analysis process; updating the constructed security graph with the determined relationships among the identified security objects; and storing the constructed security graph in a graph database.Type: GrantFiled: March 28, 2024Date of Patent: April 8, 2025Assignee: Wiz, Inc.Inventors: Shai Keren, Daniel Hershko Shemesh
-
Patent number: 12273412Abstract: A method and system for providing textual insights on objects deployed in a cloud environment are provided. The method includes collecting object data on objects deployed in the cloud environment, wherein objects are deployed and operable at different layers of the cloud environment; identifying objects deployed in the cloud environment; constructing a visual representation of the cloud environment, including the identified objects and their relationships; and generating textual insights on the identified objects and their relationships using natural language processing.Type: GrantFiled: October 2, 2023Date of Patent: April 8, 2025Assignee: Wiz, Inc.Inventors: Shai Keren, Daniel Hershko Shemesh, Roy Reznik, Ami Luttwak, Avihai Berkovitz
-
Patent number: 12273258Abstract: A system and method for performing inspection of a reachable code object of a cloud computing environment is presented. The method includes detecting a network path for each resource of a plurality of resources deployed in a cloud computing environment, wherein the network path includes at least a portion between an external network and the cloud computing environment; determining reachability parameters of each resource of the plurality of resources for which a network path is detected; accessing a code repository including a plurality of code objects; actively inspecting the network path of a resource to determine if the network path is a viable network path; mapping each resource having a viable network path to a code object of the plurality of code objects; inspecting a mapped code object for a cybersecurity object; and initiating a remediation action based on the cybersecurity object.Type: GrantFiled: October 16, 2024Date of Patent: April 8, 2025Assignee: Wiz, Inc.Inventors: Assaf Segal, Ami Luttwak, Shir Tamari, Arnon Trabelsi, Amir Lande Blau
-
Patent number: 12273358Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.Type: GrantFiled: September 18, 2024Date of Patent: April 8, 2025Assignee: Wiz, Inc.Inventors: Avi Tal Lichtenstein, Ami Luttwak, Daniel Hershko Shemesh
-
Patent number: 12267326Abstract: A system and method for performing authorization based active inspection of network paths for a resource, deployed in a cloud computing environment, includes receiving at least one network path to access the resource, wherein the resource is a cloud object deployed in the cloud computing environment, and potentially accessible from a network which is external to the cloud computing environment; and actively inspecting the at least one network path to determine if the resource is accessible through the at least one network path from a network external to the cloud computing environment and requires access authorization.Type: GrantFiled: April 13, 2022Date of Patent: April 1, 2025Assignee: Wiz, Inc.Inventors: Matilda Lidgi, Shai Keren, Raaz Herzberg, Avi Tal Lichtenstein, Ami Luttwak, Roy Reznik
-
Patent number: 12261877Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.Type: GrantFiled: March 26, 2024Date of Patent: March 25, 2025Assignee: Wiz, Inc.Inventors: Elad Gabay, Yaniv Shaked, Alon Schindel, Roy Reznik, Ami Luttwak
-
Publication number: 20250094208Abstract: A system and method for applying cybersecurity policies across multiple computing environments is presented.Type: ApplicationFiled: December 4, 2024Publication date: March 20, 2025Applicant: Wiz, Inc.Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Raaz HERZBERG, Yaniv Joseph OLIVER, Osher HAZAN, Niv Roit BEN DAVID
-
Publication number: 20250097201Abstract: A system and method for providing dynamic network traffic policies is provided. The method includes: inspecting a workload for a cybersecurity object, the cybersecurity object indicating a cybersecurity risk, wherein the workload is deployed in a cloud computing environment having a firewall connected to an external network; detecting the cybersecurity risk on the workload based on the cybersecurity object; generating a policy for the firewall based on the cybersecurity risk; and configuring the firewall to apply the generated policy.Type: ApplicationFiled: November 19, 2024Publication date: March 20, 2025Applicant: Wiz, Inc.Inventors: Lidor GONSHOROWITZ, Oron NOAH, Ami LUTTWAK, Yinon COSTICA, Roy REZNIK
-
Patent number: 12255948Abstract: A method and system for providing textual insights on objects deployed in a cloud environment are provided. The method includes collecting object data on objects deployed in the cloud environment, wherein objects are deployed and operable at different layers of the cloud environment; identifying objects deployed in the cloud environment; constructing a visual representation of the cloud environment, including the identified objects and their relationships; and generating textual insights on the identified objects and their relationships using natural language processing.Type: GrantFiled: September 18, 2024Date of Patent: March 18, 2025Assignee: Wiz, Inc.Inventors: Shai Keren, Daniel Hershko Shemesh, Roy Reznik, Ami Luttwak, Avihai Berkovitz
-
Patent number: 12255900Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.Type: GrantFiled: September 26, 2023Date of Patent: March 18, 2025Assignee: Wiz, Inc.Inventors: Avi Tal Lichtenstein, Ami Luttwak, Daniel Hershko Shemesh
-
Publication number: 20250088349Abstract: A system and method for inspecting encrypted disks for a cybersecurity object using a generic key is disclosed. The method includes: detecting an encrypted disk in a cloud computing environment, the cloud computing environment including a security policy service; authorizing a key policy on the security policy service for a default key of an inspector account, wherein the key policy is a policy authorized to decrypt the encrypted disk; generating a second encrypted disk based on the encrypted disk; inspecting the second encrypted disk for a cybersecurity object with the default key; and releasing a resource allocated to the second encrypted disk in response to completing the inspection.Type: ApplicationFiled: November 22, 2024Publication date: March 13, 2025Applicant: Wiz, Inc.Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Yaniv SHAKED, Eyal MOSCOVICI
-
Publication number: 20250086203Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment includes generating a snapshot from a managed database service, the snapshot including a plurality of data files stored in a bucket on a cloud computing environment; detecting a data object in the plurality of data files, the data object including a data schema and a content; classifying the first data object based on the content, wherein the content is classified as sensitive data or non-sensitive data; and generating a node on a security graph stored in a graph database to represent the first data object and the classification thereof, wherein the security graph further includes a representation of the cloud computing environment.Type: ApplicationFiled: November 22, 2024Publication date: March 13, 2025Applicant: Wiz, Inc.Inventors: Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami LUTTWAK, Moran COHEN, Yaniv SHAKED, Yinon COSTICA, George PISHA
-
Patent number: 12250231Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.Type: GrantFiled: September 17, 2024Date of Patent: March 11, 2025Assignee: Wiz, Inc.Inventors: Avi Tal Lichtenstein, Ami Luttwak, Daniel Hershko Shemesh
-
Patent number: 12248584Abstract: A system and method for evaluating definitions from a markup language document for agentless host configuration of an image in a virtualized computing environment generates an instruction to deploy a virtual instance based on a base image, the virtual instance including a disk. The method further includes generating an inspectable disk based on the disk of the virtual instance; receiving a markup language document, the document including a plurality of definitions, each including a data element; inspecting the inspectable disk for a cybersecurity object corresponding to a data element of a first definition of the plurality of definitions; evaluating the first definition based on the cybersecurity object to generate an evaluated first definition result, in response to determining that the definition is evaluable; generating an output based on the evaluated first definition result; and generating the output based on a notification, in response to determining that the definition is unevaluable.Type: GrantFiled: September 23, 2022Date of Patent: March 11, 2025Assignee: Wiz, Inc.Inventors: Yaniv Shaked, Mattan Shalev, Gal Kozoshnik, Daniel Klein, Roy Reznik, Ami Luttwak
-
Patent number: 12250230Abstract: A system and method for detecting potential lateral movement in a cloud computing environment includes detecting a private encryption key and a certificate, each of which further include a hash value of a respective public key, wherein the certificate is stored on a first resource deployed in the cloud computing environment; generating in a security graph: a private key node, a certificate node, and a resource node connected to the certificate node, wherein the security graph is a representation of the cloud computing environment; generating a connection in the security graph between the private key node and the certificate node, in response to determining a match between the hash values of the public key of the private key and the public key of the certificate; and determining that the first resource node is potentially compromised, in response to receiving an indication that an element of the public key is compromised.Type: GrantFiled: September 17, 2024Date of Patent: March 11, 2025Assignee: Wiz, Inc.Inventors: Avi Tal Lichtenstein, Ami Luttwak, Yinon Costica
-
Patent number: 12248581Abstract: An architecture of a multi-cloud inspector for any computing device type is provided. According to an embodiment, a method for implementing multi-cloud inspection includes accessing an object list, determining which objects to inspect, determining which inspectors to use, creating object copies, providing and running inspectors for each object copy, receiving inspection report summaries, generating an enriched dataset, and adding the enriched dataset to a security graph database.Type: GrantFiled: March 3, 2022Date of Patent: March 11, 2025Assignee: Wiz, Inc.Inventors: Yaniv Shaked, Ami Luttwak, Gal Kozoshnik, Roy Reznik, Yarin Miran