Patents Assigned to Wiz, Inc.
-
Patent number: 12248909Abstract: A system and method for agentless generation of a software bill of materials (SBOM) in a cloud computing environment is disclosed. The method includes: accessing a plurality of workloads in a cloud computing environment; detecting in each workload of the plurality of workloads a software component; generating for each workload an SBOM based on the detected software component; and storing each SBOM in a database.Type: GrantFiled: July 16, 2024Date of Patent: March 11, 2025Assignee: Wiz, Inc.Inventors: Mattan Shalev, Yaniv Shaked, Gal Kozoshnik, Omri Kornblau, Roy Reznik, Ami Luttwak, Yinon Costica
-
Publication number: 20250078028Abstract: A system and method for agentless generation of a software bill of materials (SBOM) in a cloud computing environment is disclosed. The method includes: accessing a plurality of workloads in a cloud computing environment; detecting in each workload of the plurality of workloads a software component; generating for each workload an SBOM based on the detected software component; and storing each SBOM in a database.Type: ApplicationFiled: July 16, 2024Publication date: March 6, 2025Applicant: Wiz, Inc.Inventors: Mattan SHALEV, Yaniv SHAKED, Gal KOZOSHNIK, Omri KORNBLAU, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA
-
Publication number: 20250077509Abstract: A system and method for generating a database query based on a natural language query improves database utilization is presented. The method includes receiving a natural language query directed to a security database, wherein the security database includes a representation of a computing environment; selecting a first database query from a plurality of database queries; generating a second database query based on the first database query adapted by the received natural language query; and executing the second database query on the security database.Type: ApplicationFiled: April 30, 2024Publication date: March 6, 2025Applicant: Wiz, Inc.Inventors: Alon SCHINDEL, Barak SHARONI, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
-
Publication number: 20250077655Abstract: A system and method for providing cybersecurity incident response is presented. The method includes receiving an incident input based on an event in a computing environment; generating an input for a generative artificial intelligence (AI) based on the received incident input; utilizing the generative AI to generate an output based on the generated input; utilizing the generative AI to associate the received incident input with an incident response action of a plurality of incident response actions; generating a query based on the received incident; executing the query on a security database, the security database including a representation of the computing environment; and initiating a mitigation action based on a result of the executed query and the associated incident response action.Type: ApplicationFiled: August 9, 2024Publication date: March 6, 2025Applicant: Wiz, Inc.Inventors: Alon SCHINDEL, Barak SHARONI, Amitai COHEN, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
-
Publication number: 20250078029Abstract: A system and method for agentless generation of a software bill of materials (SBOM) in a cloud computing environment is disclosed. The method includes: accessing a plurality of workloads in a cloud computing environment; detecting in each workload of the plurality of workloads a software component; generating for each workload an SBOM based on the detected software component; and storing each SBOM in a database.Type: ApplicationFiled: September 17, 2024Publication date: March 6, 2025Applicant: Wiz, Inc.Inventors: Mattan SHALEV, Yaniv SHAKED, Gal KOZOSHNIK, Omri KORNBLAU, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA
-
Patent number: 12244634Abstract: A system and method for detecting a permission escalation event in a computing environment is disclosed. The method includes: generating a cloned disk based on an original disk of a resource deployed in a computing environment; detecting an identifier of a first principal on the cloned disk; detecting a second principal in the computing environment, the first principal authorized to assume the first principal; storing a representation of the computing environment in a security database, including: a first principal node representing the first principal, and a second principal node representing the second principal, further associated with a permission; querying the representation to determine a permission of the first principal; determining that the second principal includes a permission which the first principal does not include based on a result of querying the representation; and generating a permission escalation event.Type: GrantFiled: April 26, 2024Date of Patent: March 4, 2025Assignee: Wiz, Inc.Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Avihai Berkovitz, George Pisha, Yaniv Joseph Oliver, Udi Reitblat, Or Heller, Raaz Herzberg, Osher Hazan, Niv Roit Ben David
-
Patent number: 12242601Abstract: A system and method for evaluating definitions from a markup language document for agentless host configuration includes generating an inspectable disk based on a disk of a host, the host deployed in a virtualized computing environment. The system is configured to: receive a markup language document, the markup language document including a plurality of definitions, each definition including a data element; inspect the inspectable disk for a cybersecurity object corresponding to a first data element of a first definition of the plurality of definitions; evaluate the first definition further based on the cybersecurity object to generate an evaluated first definition result, in response to determining that the definition is evaluable; generate an output based on the evaluated first definition result; and generate the output based on a predetermined notification, in response to determining that the definition is unevaluable.Type: GrantFiled: September 8, 2022Date of Patent: March 4, 2025Assignee: Wiz, Inc.Inventors: Yaniv Shaked, Mattan Shalev, Gal Kozoshnik, Daniel Klein, Roy Reznik, Ami Luttwak
-
Patent number: 12244627Abstract: A system and method for performing active inspection of vulnerability exploitation in a cloud computing environment. The method includes receiving at least one network path to access a first resource, wherein the first resource is a cloud object is deployed in the cloud computing environment and having a known vulnerability, wherein the first resource is potentially accessible from a network which is external to the cloud computing environment; actively inspecting the at least one network path to determine if the first resource is accessible through the at least one network path from a network external to the cloud computing environment; and triggering the known vulnerability to determine if the first resource can be exploited with the known vulnerability, in response to determining that the first resource is accessible through the external network.Type: GrantFiled: April 13, 2022Date of Patent: March 4, 2025Assignee: Wiz, Inc.Inventors: Matilda Lidgi, Shai Keren, Raaz Herzberg, Avi Tal Lichtenstein, Ami Luttwak, Roy Reznik
-
Patent number: 12231459Abstract: A technique and method for detection and display of the cybersecurity risk context of a cloud environment initiates an inspection of cybersecurity objects within a cloud environment utilizing an inspection environment and stores information pertaining to discovered cybersecurity objects within the inspected cloud environment in a storage environment. The technique and method further generate a cybersecurity risk context for the inspected cloud environment based on the observations made concerning the cybersecurity objects contained within it. The technique and method further configure a web browser running on a client device to automatically display the generated cybersecurity risk context to a user, either through a web page overlay or through a toolbar plugin which has been installed in the web browser and configured to enable inspections of a cloud environment, once the user has navigated to a web page containing cybersecurity object identifiers.Type: GrantFiled: March 27, 2024Date of Patent: February 18, 2025Assignee: Wiz, Inc.Inventors: Tomer Gil Levi, Yinon Costica, Ben Grynhaus, Itai Yosephi, Oron Noah, Eyal Wiener
-
Patent number: 12231440Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.Type: GrantFiled: March 26, 2024Date of Patent: February 18, 2025Assignee: Wiz, Inc.Inventors: Avi Tal Lichtenstein, Ami Luttwak, Daniel Hershko Shemesh
-
Patent number: 12229257Abstract: A system and method for preventing cloud identity misuse in a cloud computing environment is presented. The method includes: deploying a runtime sensor on a workload in a cloud computing environment; detecting an event in a cloud log, the event including an identifier of the workload; associating a runtime process detected by the runtime sensor on the workload with the event detected in the cloud log; generating an enriched event based on: the detected event, and an identifier of the associated runtime process; applying a policy on the enriched event; and initiating a mitigation action in the cloud computing environment based on a result of applying the policy on the enriched event.Type: GrantFiled: March 29, 2024Date of Patent: February 18, 2025Assignee: Wiz, Inc.Inventors: Ami Luttwak, Alon Schindel, Shir Tamari, Ron Cohen
-
Patent number: 12225037Abstract: A system and method for associating an event in a cloud computing log to a process running on a workload is presented. The method includes: configuring a workload deployed in a cloud computing environment to deploy thereon a sensor, the sensor configured to detect a runtime process on the workload, the runtime process utilizing an identity; detecting in a log of the cloud computing environment an event based on an identifier of the workload, the log including a plurality of events; inspecting a code object for a cybersecurity object, the code object utilized in deploying the workload in the cloud computing environment; associating the runtime process with the event based on an identifier of the workload and the cybersecurity object, wherein the cybersecurity object indicates the identity; and generating an enriched log including an identifier of the runtime process associated with the event and the cybersecurity object.Type: GrantFiled: March 29, 2024Date of Patent: February 11, 2025Assignee: Wiz, Inc.Inventors: Ami Luttwak, Alon Schindel, Shir Tamari, Ron Cohen
-
Patent number: 12219053Abstract: A system and method reduces use of restricted operations in a cloud computing environment during cybersecurity threat inspection. The method includes: detecting an encrypted disk in a cloud computing environment, the encrypted disk encrypted utilizing a first key in a key management system (KMS); generating a second key in the KMS, the second key providing access for a principal of an inspection environment; generating a snapshot of the encrypted disk; generating a volume based on the snapshot, wherein the volume is re-encrypted with the second key; generating a snapshot of the re-encrypted volume; generating an inspectable disk from the snapshot of the re-encrypted volume; and initiating inspection for a cybersecurity object on the inspectable disk.Type: GrantFiled: April 29, 2024Date of Patent: February 4, 2025Assignee: Wiz, Inc.Inventors: Shahar Rand, Eric Abramov, Yaniv Shaked, Elad Gabay
-
Patent number: 12217079Abstract: A system and method for applying cybersecurity policies across multiple computing environments is presented.Type: GrantFiled: December 29, 2023Date of Patent: February 4, 2025Assignee: Wiz, Inc.Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Raaz Herzberg, Yaniv Joseph Oliver, Osher Hazan, Niv Roit Ben David
-
Patent number: 12219048Abstract: A system and method for inspecting encrypted disks for a cybersecurity object using a generic key is disclosed. The method includes: detecting an encrypted disk in a cloud computing environment, the cloud computing environment including a security policy service; authorizing a key policy on the security policy service for a default key of an inspector account, wherein the key policy is a policy authorized to decrypt the encrypted disk; generating a second encrypted disk based on the encrypted disk; inspecting the second encrypted disk for a cybersecurity object with the default key; and releasing a resource allocated to the second encrypted disk in response to completing the inspection.Type: GrantFiled: October 4, 2023Date of Patent: February 4, 2025Assignee: Wiz, Inc.Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Yaniv Shaked, Eyal Moscovici
-
Patent number: 12212586Abstract: A system and method for detecting cybersecurity risk on a resource in a computing environment utilizes static analysis of a cloned resource and runtime data from the live resource. The method includes: configuring a resource deployed in a computing environment to deploy thereon a sensor, the sensor configured to detect runtime data; detecting runtime data from the sensor of the resource; generating an inspectable disk based on an original disk of the resource; initiating inspection based on the detected runtime data for a cybersecurity object on the inspectable disk; detecting the cybersecurity object on an inspectable disk; and initiating a mitigation action on the resource.Type: GrantFiled: January 31, 2024Date of Patent: January 28, 2025Assignee: Wiz, Inc.Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Aviel Fogel, Udi Reitblat, Alon Schindel
-
Publication number: 20250021665Abstract: A system and method for securing the development of software applications are provided.Type: ApplicationFiled: October 2, 2024Publication date: January 16, 2025Applicant: Wiz, Inc.Inventors: Assaf RAPPAPORT, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
-
Publication number: 20250013625Abstract: A method and system for populating multi-layer technology product catalogs are provided.Type: ApplicationFiled: September 17, 2024Publication date: January 9, 2025Applicant: Wiz, Inc.Inventors: Gal KOZOSHNIK, Raaz HERZBERG, Yinon COSTICA, Yaniv SHAKED, Daniel KLEIN, Ami LUTTWAK
-
Publication number: 20250016172Abstract: A system and method for detecting potential lateral movement in a cloud computing environment includes detecting a private encryption key and a certificate, each of which further include a hash value of a respective public key, wherein the certificate is stored on a first resource deployed in the cloud computing environment; generating in a security graph: a private key node, a certificate node, and a resource node connected to the certificate node, wherein the security graph is a representation of the cloud computing environment; generating a connection in the security graph between the private key node and the certificate node, in response to determining a match between the hash values of the public key of the private key and the public key of the certificate; and determining that the first resource node is potentially compromised, in response to receiving an indication that an element of the public key is compromised.Type: ApplicationFiled: September 17, 2024Publication date: January 9, 2025Applicant: Wiz, Inc.Inventors: Avi Tal LICHTENSTEIN, Ami LUTTWAK, Yinon COSTICA
-
Publication number: 20250016174Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.Type: ApplicationFiled: September 17, 2024Publication date: January 9, 2025Applicant: Wiz, Inc.Inventors: Avi Tal LICHTENSTEIN, Ami LUTTWAK, Daniel Hershko SHEMESH