Abstract: A method for scalable vulnerability detection is provided. The method includes selecting at least a workload of a plurality of workloads deployed in a first cloud environment for inspection, wherein the workload includes a first volume; generating in a remote cluster an inspection node, the inspection node including at least a first disk, wherein the remote cluster provisions inspection nodes in response to demand for inspection nodes; generating a persistent volume (PV) on which the at least a first disk is mounted, wherein the at least a first disk is generated from a snapshot of the first volume; and generating a persistent volume claim (PVC) of the PV for an inspector workload, wherein the inspector workload is configured to inspect the PV for an object, and wherein inspector workloads are provisioned in response to demand for inspector workloads.
Type:
Grant
Filed:
December 7, 2023
Date of Patent:
July 2, 2024
Assignee:
Wiz, Inc.
Inventors:
Yarin Miran, Ami Luttwak, Roy Reznik, Avihai Berkovitz, Moran Cohen, Yaniv Shaked, Yaniv Joseph Oliver
Abstract: A system and method for detecting a combined cybersecurity risk for an artificial intelligence (AI) model is presented. The method includes: inspecting a computing environment for an AI model deployed therein; generating a representation of the AI model in a security database, the security database including a representation of the computing environment; detecting a first cybersecurity risk respective of the AI model; inspecting the computing environment for a cybersecurity object; determining that the AI model is exposed to a toxic combination cybersecurity risk based on the detected first cybersecurity risk and the cybersecurity object; and initiating a mitigation action based on the toxic combination cybersecurity risk.
Abstract: A system and method for initiating a mitigation action based on active inspection of a cloud computing environment. The method includes: receiving at least one network path to access a resource deployed in the cloud computing environment, and potentially accessible from a network which is external to the cloud computing environment; actively inspecting the at least one network path to determine if the resource is accessible through the at least one network path from a network external to the cloud computing environment; generating a graphic element based on receiving a response from the resource of the active inspection of the at least one network path; generating an action graphic element associated with the response; rendering the graphic element and the action graphic element on a display; and initiating a mitigation action based on the response, in response to receiving an input based on the rendered action graphic element.
Type:
Application
Filed:
December 27, 2022
Publication date:
June 27, 2024
Applicant:
Wiz, Inc.
Inventors:
Matilda LIDGI, Shai KEREN, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami LUTTWAK, Roy REZNIK
Abstract: A system and method for performing active inspection of a cloud computing environment to detect exposed sensitive data. The method also includes receiving at least one network path to access a first resource, where the first resource is a cloud object deployed in the cloud computing environment, and potentially accessible from a network which is external to the cloud computing environment; and generating a first instruction to access the first resource based on a plurality of reachability parameters designated in the at least one network path; causing execution of the generated first instruction to access the first resource; receiving an output, the output generated in response to execution of the generated first instruction; detecting in the output a predetermined sensitive data indicator; and initiating a mitigation action in response to detecting the sensitive data indicator in the output.
Type:
Application
Filed:
December 27, 2022
Publication date:
June 27, 2024
Applicant:
Wiz, Inc.
Inventors:
Matilda LIDGI, Shai KEREN, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami LUTTWAK, Roy REZNIK
Abstract: A system and method for performing active inspection of a computing environment utilizes optical character recognition. The method includes: receiving at least one network path to access a first resource, where the first resource is a cloud object deployed in the cloud computing environment, potentially accessible from a network which is external to the cloud computing environment; and generating a first instruction to access the first resource based on a plurality of reachability parameters designated in the at least one network path; causing execution of the generated first instruction to access the first resource; receiving a graphical output, the graphical output generated in response to execution of the generated first instruction; performing optical character recognition on the graphical output to generate a textual output; detecting in the textual output a predetermined data indicator; and initiating a second active inspection in response to detecting the data indicator in the textual output.
Type:
Application
Filed:
December 27, 2022
Publication date:
June 27, 2024
Applicant:
Wiz, Inc.
Inventors:
Matilda LIDGI, Shai KEREN, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami LUTTWAK, Roy REZNIK
Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.
Type:
Grant
Filed:
May 30, 2023
Date of Patent:
June 11, 2024
Assignee:
Wiz, Inc.
Inventors:
Elad Gabay, Yaniv Shaked, Alon Schindel, Roy Reznik, Ami Luttwak
Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.
Type:
Grant
Filed:
September 26, 2023
Date of Patent:
June 11, 2024
Assignee:
Wiz, Inc.
Inventors:
Avi Tal Lichtenstein, Ami Luttwak, Daniel Hershko Shemesh
Abstract: A system and method for providing cybersecurity incident response utilizing a large language model. The method includes: mapping a received incident input into a scenario of a plurality of scenarios, each scenario including a plurality of sub-scenarios; generating a query based on the received incident input and a selection of a sub-scenario of the plurality of sub-scenarios; executing the query on a security database, the security database including a representation of the computing environment; and initiating a mitigation action based on a result of the executed query.
Type:
Grant
Filed:
September 14, 2023
Date of Patent:
June 4, 2024
Assignee:
WIZ, INC.
Inventors:
Alon Schindel, Barak Sharoni, Amitai Cohen, Ami Luttwak, Roy Reznik, Yinon Costica
Abstract: A system and method for detecting a cybersecurity risk of an artificial intelligence (AI), is presented. The method includes: inspecting a computing environment for an AI model deployed therein; generating a representation of the AI model in a security database, the security database including a representation of the computing environment; inspecting the AI model for a cybersecurity risk; generating a representation of the cybersecurity risk in the security database, the representation of the cybersecurity risk connected to the representation of the AI model in response to detecting the cybersecurity risk; and initiating a mitigation action based on the cybersecurity risk.
Type:
Grant
Filed:
February 22, 2024
Date of Patent:
June 4, 2024
Assignee:
Wiz, Inc.
Inventors:
Amitai Cohen, Barak Sharoni, Shir Tamari, George Pisha, Itay Arbel, Daniel Velikanski, Yaniv Shaked
Abstract: A method for scalable vulnerability detection is provided. The method includes selecting at least a workload of a plurality of workloads deployed in a first cloud environment for inspection, wherein the workload includes a first volume; generating in a remote cluster an inspection node, the inspection node including at least a first disk, wherein the remote cluster provisions inspection nodes in response to demand for inspection nodes; generating a persistent volume (PV) on which the at least a first disk is mounted, wherein the at least a first disk is generated from a snapshot of the first volume; and generating a persistent volume claim (PVC) of the PV for an inspector workload, wherein the inspector workload is configured to inspect the PV for an object, and wherein inspector workloads are provisioned in response to demand for inspector workloads.
Type:
Grant
Filed:
September 15, 2023
Date of Patent:
June 4, 2024
Assignee:
Wiz, Inc.
Inventors:
Yarin Miran, Ami Luttwak, Roy Reznik, Avihai Berkovitz, Moran Cohen, Yaniv Shaked, Yaniv Joseph Oliver
Abstract: A system and method for providing cybersecurity incident response utilizing a large language model. The method includes: mapping a received incident input into a scenario of a plurality of scenarios, each scenario including a plurality of sub-scenarios; generating a query based on the received incident input and a selection of a sub-scenario of the plurality of sub-scenarios; executing the query on a security database, the security database including a representation of the computing environment; and initiating a mitigation action based on a result of the executed query.
Type:
Grant
Filed:
January 31, 2024
Date of Patent:
June 4, 2024
Assignee:
Wiz, Inc.
Inventors:
Alon Schindel, Barak Sharoni, Amitai Cohen, Ami Luttwak, Roy Reznik, Yinon Costica
Abstract: A system and method reduces use of restricted operations in a cloud computing environment during cybersecurity threat inspection. The method includes: detecting an encrypted disk in a cloud computing environment, the encrypted disk encrypted utilizing a first key in a key management system (KMS); generating a second key in the KMS, the second key providing access for a principal of an inspection environment; generating a snapshot of the encrypted disk; generating a volume based on the snapshot, wherein the volume is re-encrypted with the second key; generating a snapshot of the re-encrypted volume; generating an inspectable disk from the snapshot of the re-encrypted volume; and initiating inspection for a cybersecurity object on the inspectable disk.
Type:
Grant
Filed:
July 26, 2023
Date of Patent:
June 4, 2024
Assignee:
Wiz, Inc.
Inventors:
Shahar Rand, Eric Abramov, Yaniv Shaked, Elad Gabay
Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment. The method includes detecting a first data object including a data schema and a content in a cloud computing environment; detecting a second data object, having the data schema of the first data object; generating in a security graph: a first data object node representing the first data object, a second data object node representing the second data object, and a data schema node representing the data schema; storing a classification based on the content in the security graph, wherein the content is classified as sensitive data or non-sensitive data; and rendering an output based on the classification and the data schema node, in lieu of the first data object node and the second data object node, in response to receiving a query to detect a node representing a data object classified as sensitive data.
Type:
Grant
Filed:
October 24, 2022
Date of Patent:
June 4, 2024
Assignee:
WIZ, INC.
Inventors:
Raaz Herzberg, Avi Tal Lichtenstein, Roy Reznik, Ami Luttwak, Moran Cohen, Yaniv Shaked, Yinon Costica, George Pisha
Abstract: An architecture of a multi-cloud inspector for any computing device type is provided. According to an embodiment, a method for implementing multi-cloud inspection includes accessing an object list, determining which objects to inspect, determining which inspectors to use, creating object copies, providing and running inspectors for each object copy, receiving inspection report summaries, generating an enriched dataset, and adding the enriched dataset to a security graph database.
Type:
Grant
Filed:
September 28, 2023
Date of Patent:
May 28, 2024
Assignee:
WIZ, INC.
Inventors:
Yaniv Shaked, Ami Luttwak, Gal Kozoshnik, Roy Reznik, Yarin Miran
Abstract: A system and method for applying cybersecurity policies across multiple computing environments is presented.
Type:
Application
Filed:
December 29, 2023
Publication date:
May 23, 2024
Applicant:
Wiz, Inc.
Inventors:
Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Raaz HERZBERG, Yaniv Joseph OLIVER, Osher HAZAN, Niv Roit BEN DAVID
Abstract: A system and method for generation of unified graph models for network entities are provided. The method includes collecting, for at least one network entity of a plurality of network entities, at least one network entity data feature, wherein the at least one network entity data feature is a network entity property; genericizing the collected at least one network entity; generating at least a network graph, wherein the generated network graph is a multi-dimensional data structure providing a representation of the plurality of network entities and relations between the network entities of the plurality of network entities; and storing the generated at least a network graph.
Type:
Application
Filed:
January 10, 2024
Publication date:
May 16, 2024
Applicant:
Wiz, Inc.
Inventors:
Daniel Hershko SHEMESH, Liran MOYSI, Roy REZNIK, Shai KEREN
Abstract: A method and system for providing textual insights on objects deployed in a cloud environment are provided. The method includes collecting object data on objects deployed in the cloud environment, wherein objects are deployed and operable at different layers of the cloud environment; identifying objects deployed in the cloud environment; constructing a visual representation of the cloud environment, including the identified objects and their relationships; and generating textual insights on the identified objects and their relationships using natural language processing.
Type:
Grant
Filed:
September 29, 2023
Date of Patent:
May 14, 2024
Assignee:
WIZ, INC.
Inventors:
Shai Keren, Daniel Hershko Shemesh, Roy Reznik, Ami Luttwak, Avihai Berkovitz
Abstract: A method and system for providing textual insights on objects deployed in a cloud environment are provided. The method includes collecting object data on objects deployed in the cloud environment, wherein objects are deployed and operable at different layers of the cloud environment; identifying objects deployed in the cloud environment; constructing a visual representation of the cloud environment, including the identified objects and their relationships; and generating textual insights on the identified objects and their relationships using natural language processing.
Type:
Application
Filed:
October 2, 2023
Publication date:
May 2, 2024
Applicant:
Wiz, Inc.
Inventors:
Shai KEREN, Daniel Hershko SHEMESH, Roy REZNIK, Ami LUTTWAK, Avihai BERKOVITZ
Abstract: A system and method for technology stack discovery by performing active inspection of a cloud computing environment utilizing disk cloning is described. The method includes: generating an inspectable disk based on an original disk of a reachable resource, wherein the reachable resource is a cloud object deployed in the cloud computing environment, and accessible from a network which is external to the cloud computing environment; detecting a cybersecurity object on the inspectable disk, the cybersecurity object indicating a cybersecurity issue; selecting a network path including a network protocol to access the reachable resource; and actively inspecting the network path to detect the cybersecurity issue.
Type:
Application
Filed:
December 29, 2023
Publication date:
May 2, 2024
Applicant:
Wiz, Inc.
Inventors:
Matilda LIDGI, Shai KEREN, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami LUTTWAK, Roy REZNIK, Daniel Hershko SHEMESH, Yarin MIRAN, Yinon COSTICA