Patents Assigned to WIZ
  • Patent number: 12095912
    Abstract: A system and method for inspecting encrypted disks for a cybersecurity object using a custom key are disclosed. The method includes detecting an encrypted disk in a cloud computing environment, the cloud computing environment including a security policy service; authorizing a key policy on the security policy service for a custom key of an inspector account, wherein the key policy is a policy authorized to decrypt the encrypted disk; generating a second encrypted disk based on the encrypted disk; inspecting the second encrypted disk for a cybersecurity object with the custom key; and releasing a resource allocated to the second encrypted disk in response to completing the inspection.
    Type: Grant
    Filed: December 26, 2023
    Date of Patent: September 17, 2024
    Assignee: Wiz, Inc.
    Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Yaniv Shaked, Eyal Moscovici
  • Patent number: 12095807
    Abstract: A system and method initiating remediation actions in response to a cybersecurity issue in a computing environment is disclosed. The method includes: configuring a virtual instance in a computing environment to communicate with an inspection environment; configuring the virtual instance to receive in the computing environment a plurality of remediation scripts from the inspection environment; generating a remediation infrastructure including a plurality of remediation actions, each remediation action corresponding to at least a remediation script of the plurality of remediation scripts; detecting a cybersecurity issue in the computing environment; configuring the virtual instance to initiate a remediation action of the plurality of remediation actions, based on detecting the cybersecurity issue; and receiving a feedback in the inspection environment from the virtual instance in response to initiating the remediation action.
    Type: Grant
    Filed: December 14, 2023
    Date of Patent: September 17, 2024
    Assignee: Wiz, Inc.
    Inventors: Itay Arbel, Solal Raveh, Orr Shamli, Chris Beckett, Ben Grynhaus, Eyal Zisman
  • Patent number: 12095776
    Abstract: A system and method for detecting potential lateral movement in a cloud computing environment includes detecting a private encryption key and a certificate, each of which further include a hash value of a respective public key, wherein the certificate is stored on a first resource deployed in the cloud computing environment; generating in a security graph: a private key node, a certificate node, and a resource node connected to the certificate node, wherein the security graph is a representation of the cloud computing environment; generating a connection in the security graph between the private key node and the certificate node, in response to determining a match between the hash values of the public key of the private key and the public key of the certificate; and determining that the first resource node is potentially compromised, in response to receiving an indication that an element of the public key is compromised.
    Type: Grant
    Filed: December 22, 2023
    Date of Patent: September 17, 2024
    Assignee: WIZ, INC.
    Inventors: Avi Tal Lichtenstein, Ami Luttwak, Yinon Costica
  • Patent number: 12093384
    Abstract: A system and method for detecting a cybersecurity object in operating system-level virtualization objects. The method comprises: inspecting a first image of an operating system-level virtualization for a cybersecurity object; inspecting a second image for the cybersecurity object, wherein the second image is based off of the first image; associating the cybersecurity object with the first image, in response to detecting the cybersecurity object in the first image and detecting the cybersecurity object in the second image; and associating the cybersecurity object with the second image, in response to detecting the cybersecurity object in the second image and not detecting the cybersecurity object in the first image.
    Type: Grant
    Filed: June 30, 2022
    Date of Patent: September 17, 2024
    Assignee: Wiz, Inc.
    Inventors: Yaniv Joseph Oliver, Ami Luttwak, Yinon Costica, Roy Reznik, Yaniv Shaked, Amir Lande Blau
  • Patent number: 12095808
    Abstract: A system and method for near-real time inspection of a computing environment for a cybersecurity object is presented. The method includes: continuously receiving a plurality of event records, each event record having an event type, and corresponding to an event in the computing environment; detecting in the plurality of event records, an event record of a first type; parsing the event record of the first type to detect a resource identifier, wherein the resource identifier corresponds to a resource deployed in the computing environment; initiating inspection of the resource for a cybersecurity object; and initiating a mitigation action in the computing environment, in response to detecting the cybersecurity object on the resource.
    Type: Grant
    Filed: March 13, 2024
    Date of Patent: September 17, 2024
    Assignee: Wiz, Inc.
    Inventors: Alon Weiss, Itamar Azulay, Tom Lev Ran
  • Publication number: 20240303329
    Abstract: A system and method for generating a compact representation of a computing environment having a remediated cybersecurity threat is disclosed. In an embodiment, the method includes generating an inspectable disk based on a disk of a resource in the computing environment; detecting a forensic artifact on the inspectable disk; traversing a security graph for a forensic finding based on the forensic artifact, wherein the security graph includes a representation of the computing environment; detecting a remediation node connected to a node representing the forensic finding; and initiating a remediation action, represented by the remediation node.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Applicant: Wiz, Inc.
    Inventors: Itay ARBEL, Mattan SHALEV, Yaniv SHAKED, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA, Eric ABRAMOV
  • Publication number: 20240303326
    Abstract: A system and method for iterative cybersecurity remediation based on a digital forensic finding is disclosed. In an embodiment, the method includes detecting a forensic finding, the forensic finding based on a forensic artifact detected on a disk of a resource in a computing environment; generating an inspectable disk based on the disk of the resource; inspecting the inspectable disk for a cybersecurity object based on the forensic artifact; and initiating a remediation action on the disk based on the cybersecurity object detected on the inspectable disk.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Applicant: Wiz, Inc.
    Inventors: Itay ARBEL, Mattan SHALEV, Yaniv SHAKED, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA, Gal KOZOSHNIK
  • Publication number: 20240303325
    Abstract: A system and method for cybersecurity remediation based on a digital forensic finding is disclosed. In an embodiment, the method includes generating an inspectable disk from a disk of a resource deployed in a computing environment; mounting the inspectable disk at a mount point on a forensic analyzer; configuring the forensic analyzer to generate a forensic finding based on the inspectable disk; and initiating a remediation action based on the forensic finding.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Applicant: Wiz, Inc.
    Inventors: Itay ARBEL, Mattan SHALEV, Yaniv SHAKED, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA, Orr SHAMLI
  • Patent number: 12079328
    Abstract: A system and method for inspecting a running container for a cybersecurity object in a cloud computing environment is disclosed. The method includes: generating a clone of a disk, wherein the disk is deployed in a cloud computing environment; detecting a software container on the generated clone of the disk; and inspecting the software container for a cybersecurity object, in response to determining that the container is a running container.
    Type: Grant
    Filed: October 10, 2023
    Date of Patent: September 3, 2024
    Assignee: Wiz, Inc.
    Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Niv Roit Ben David, Yaniv Shaked, Raaz Herzberg, Amir Lande Blau
  • Patent number: 12081656
    Abstract: A system and method reduces use of restricted operations in a cloud computing environment during cybersecurity threat inspection. The method includes: detecting an encrypted disk in a cloud computing environment, the encrypted disk encrypted utilizing a first key in a key management system (KMS); generating a second key in the KMS, the second key providing access for a principal of an inspection environment; generating a snapshot of the encrypted disk; generating a volume based on the snapshot, wherein the volume is re-encrypted with the second key; generating a snapshot of the re-encrypted volume; generating an inspectable disk from the snapshot of the re-encrypted volume; and initiating inspection for a cybersecurity object on the inspectable disk.
    Type: Grant
    Filed: July 26, 2023
    Date of Patent: September 3, 2024
    Assignee: Wiz, Inc.
    Inventors: Shahar Rand, Eric Abramov, Yaniv Shaked, Elad Gabay
  • Publication number: 20240291643
    Abstract: A system and method reduces use of restricted operations in a cloud computing environment during cybersecurity threat inspection. The method includes: detecting an encrypted disk in a cloud computing environment, the encrypted disk encrypted utilizing a first key in a key management system (KMS); generating a second key in the KMS, the second key providing access for a principal of an inspection environment; generating a snapshot of the encrypted disk; generating a volume based on the snapshot, wherein the volume is re-encrypted with the second key; generating a snapshot of the re-encrypted volume; generating an inspectable disk from the snapshot of the re-encrypted volume; and initiating inspection for a cybersecurity object on the inspectable disk.
    Type: Application
    Filed: April 29, 2024
    Publication date: August 29, 2024
    Applicant: Wiz, Inc.
    Inventors: Shahar RAND, Eric ABRAMOV, Yaniv SHAKED, Elad GABAY
  • Publication number: 20240289437
    Abstract: A system and method for inspecting a running container for a cybersecurity object in a cloud computing environment is disclosed. The method includes: generating a clone of a disk, wherein the disk is deployed in a cloud computing environment; detecting a software container on the generated clone of the disk; and inspecting the software container for a cybersecurity object, in response to determining that the container is a running container.
    Type: Application
    Filed: April 29, 2024
    Publication date: August 29, 2024
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Niv Roit BEN DAVID, Yaniv SHAKED, Raaz HERZBERG, Amir LANDE BLAU
  • Publication number: 20240275812
    Abstract: A system and method for detecting a permission escalation event in a computing environment is disclosed. The method includes: generating a cloned disk based on an original disk of a resource deployed in a computing environment; detecting an identifier of a first principal on the cloned disk; detecting a second principal in the computing environment, the first principal authorized to assume the first principal; storing a representation of the computing environment in a security database, including: a first principal node representing the first principal, and a second principal node representing the second principal, further associated with a permission; querying the representation to determine a permission of the first principal; determining that the second principal includes a permission which the first principal does not include based on a result of querying the representation; and generating a permission escalation event.
    Type: Application
    Filed: April 26, 2024
    Publication date: August 15, 2024
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Avihai BERKOVITZ, George PISHA, Yaniv Joseph OLIVER, Udi REITBLAT, Or HELLER, Raaz HERZBERG, Osher HAZAN, Niv Roit BEN DAVID
  • Patent number: 12061925
    Abstract: A system and method for inspecting managed workloads in a cloud computing environment for cybersecurity threats improves inspection of managed workload service repositories, by only inspecting bases of managed workload deployed in the cloud computing environment. The method includes discovering a managed workload deployed in a cloud computing environment; determining an identifier of the managed workload, wherein the identifier includes an indicator to a base repository in which a base is stored, and wherein the managed workload is currently deployed in the cloud computing environment, the base repository further storing a plurality of bases, wherein a portion of the plurality of bases do not correspond to a deployed workload; accessing the base repository to pull the base; and inspecting the base of the deployed managed workload for a cybersecurity threat.
    Type: Grant
    Filed: September 15, 2023
    Date of Patent: August 13, 2024
    Assignee: WIZ, INC.
    Inventors: Niv Roit Ben David, Yaniv Shaked, Yarin Miran, Raaz Herzberg, Amir Lande Blau
  • Patent number: 12061719
    Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment. The method includes detecting a first data object including a data schema and a content in a cloud computing environment; detecting a second data object, having the data schema of the first data object; generating in a security graph: a first data object node representing the first data object, a second data object node representing the second data object, and a data schema node representing the data schema; storing a classification based on the content in the security graph, wherein the content is classified as sensitive data or non-sensitive data; and rendering an output based on the classification and the data schema node, in lieu of the first data object node and the second data object node, in response to receiving a query to detect a node representing a data object classified as sensitive data.
    Type: Grant
    Filed: October 24, 2022
    Date of Patent: August 13, 2024
    Assignee: WIZ, INC.
    Inventors: Raaz Herzberg, Avi Tal Lichtenstein, Roy Reznik, Ami Luttwak, Moran Cohen, Yaniv Shaked, Yinon Costica, George Pisha
  • Publication number: 20240265115
    Abstract: An architecture of a multi-cloud inspector for any computing device type is provided. According to an embodiment, a method for implementing multi-cloud inspection includes accessing an object list, determining which objects to inspect, determining which inspectors to use, creating object copies, providing and running inspectors for each object copy, receiving inspection report summaries, generating an enriched dataset, and adding the enriched dataset to a security graph database.
    Type: Application
    Filed: March 26, 2024
    Publication date: August 8, 2024
    Applicant: Wiz, Inc.
    Inventors: Yaniv SHAKED, Ami LUTTWAK, Gal KOZOSHNIK, Roy REZNIK, Yarin MIRAN
  • Publication number: 20240267405
    Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.
    Type: Application
    Filed: March 26, 2024
    Publication date: August 8, 2024
    Applicant: Wiz, Inc.
    Inventors: Elad GABAY, Yaniv SHAKED, Alon SCHINDEL, Roy REZNIK, Ami LUTTWAK
  • Publication number: 20240267389
    Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.
    Type: Application
    Filed: March 26, 2024
    Publication date: August 8, 2024
    Applicant: Wiz, Inc.
    Inventors: Avi Tal LICHTENSTEIN, Ami LUTTWAK, Daniel Hershko SHEMESH
  • Publication number: 20240267415
    Abstract: A method and system for modeling a cloud environment as a security graph are provided. The method includes identifying security objects in the cloud environment; collecting object data of the identified security objects; constructing security graph based on collected object data of the identified security objects; determining relationships among the identified security objects, wherein the relationships are determined based on the collected object data of the identified security objects and using a static analysis process; updating the constructed security graph with the determined relationships among the identified security objects; and storing the constructed security graph in a graph database.
    Type: Application
    Filed: March 28, 2024
    Publication date: August 8, 2024
    Applicant: Wiz, Inc.
    Inventors: Shai KEREN, Daniel Hershko SHEMESH
  • Publication number: 20240250959
    Abstract: A system and method for detecting lateral movement based on an exposed cryptographic network protocol (CNP) key in a cloud computing environment. The method includes: inspecting a first workload for a private CNP key, the private CNP key associated with a hash of a public CNP key; detecting in a security database a representation of the public CNP key; generating a lateral movement path, the lateral movement path including an identifier of a second workload, the second workload represented by a representation connected to the representation of the public CNP key.
    Type: Application
    Filed: February 27, 2024
    Publication date: July 25, 2024
    Applicant: Wiz, Inc.
    Inventors: Avi Tal LICHTENSTEIN, Ami LUTTWAK, Yinon COSTICA