Patents by Inventor Amir Hozez

Amir Hozez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240007502
    Abstract: A method for defending against malicious profiles on the web comprises the steps of: i) inspecting a profile to determine its relevance to a brand that it is desired to protect from malicious activity; ii) determining whether said profile is relevant to said brand; iii) if it is determined that said profile is relevant, analyzing it to determine whether it is legitimate or malicious; and iv) if it is determined that the profile is malicious, assembling proof of its malicious activity and submitting same together with a takedown request to the administrator of the website where the profile was located.
    Type: Application
    Filed: September 14, 2023
    Publication date: January 4, 2024
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon ARVATZ, Guy Nizan
  • Publication number: 20230421547
    Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.
    Type: Application
    Filed: September 8, 2023
    Publication date: December 28, 2023
    Applicant: InSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
  • Patent number: 11792178
    Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.
    Type: Grant
    Filed: June 9, 2022
    Date of Patent: October 17, 2023
    Assignee: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
  • Patent number: 11785044
    Abstract: System and method of detecting malicious interactions in a computer network, the method including generating, by a processor, at least one decoy segment, broadcasting, by the processor, the generated at least one decoy segment in a public database, monitoring, by the processor, communication within the computer network to identify interactions associated with the generated at least one decoy segment, determining, by the processor, at least one indicator of compromise (IOC) for the identified interactions, and blocking communication between the computer network and any computer associated with the determined at least one IOC.
    Type: Grant
    Filed: February 3, 2023
    Date of Patent: October 10, 2023
    Assignee: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez
  • Publication number: 20230315846
    Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.
    Type: Application
    Filed: May 10, 2023
    Publication date: October 5, 2023
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel Ur
  • Publication number: 20230281306
    Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.
    Type: Application
    Filed: May 10, 2023
    Publication date: September 7, 2023
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel Ur
  • Patent number: 11750649
    Abstract: Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.
    Type: Grant
    Filed: December 20, 2022
    Date of Patent: September 5, 2023
    Assignee: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
  • Patent number: 11693960
    Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.
    Type: Grant
    Filed: May 18, 2021
    Date of Patent: July 4, 2023
    Assignee: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel Ur
  • Publication number: 20230179631
    Abstract: System and method of detecting malicious interactions in a computer network, the method including generating, by a processor, at least one decoy segment, broadcasting, by the processor, the generated at least one decoy segment in a public database, monitoring, by the processor, communication within the computer network to identify interactions associated with the generated at least one decoy segment, determining, by the processor, at least one indicator of compromise (IOC) for the identified interactions, and blocking communication between the computer network and any computer associated with the determined at least one IOC.
    Type: Application
    Filed: February 3, 2023
    Publication date: June 8, 2023
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez
  • Publication number: 20230126692
    Abstract: Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.
    Type: Application
    Filed: December 20, 2022
    Publication date: April 27, 2023
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
  • Patent number: 11611583
    Abstract: System and method of detecting malicious interactions in a computer network, the method including generating, by a processor, at least one decoy segment, broadcasting, by the processor, the generated at least one decoy segment in a public database, monitoring, by the processor, communication within the computer network to identify interactions associated with the generated at least one decoy segment, determining, by the processor, at least one indicator of compromise (IOC) for the identified interactions, and blocking communication between the computer network and any computer associated with the determined at least one IOC.
    Type: Grant
    Filed: June 7, 2018
    Date of Patent: March 21, 2023
    Assignee: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez
  • Patent number: 11575707
    Abstract: Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.
    Type: Grant
    Filed: December 18, 2018
    Date of Patent: February 7, 2023
    Assignee: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
  • Publication number: 20220321550
    Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.
    Type: Application
    Filed: June 9, 2022
    Publication date: October 6, 2022
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
  • Patent number: 11405374
    Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.
    Type: Grant
    Filed: March 13, 2019
    Date of Patent: August 2, 2022
    Assignee: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
  • Patent number: 11120129
    Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: September 14, 2021
    Assignee: IntSights Cyber Intelligence Ltd.
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel Ur
  • Publication number: 20210271756
    Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.
    Type: Application
    Filed: May 18, 2021
    Publication date: September 2, 2021
    Inventors: Gal BEN DAVID, Amir HOZEZ, Alon ARVATZ, Guy NIZAN, Shmuel UR
  • Publication number: 20210194923
    Abstract: A method for defending against malicious profiles on the web comprises the steps of: i) inspecting a profile to determine its relevance to a brand that it is desired to protect from malicious activity; ii) determining whether said profile is relevant to said brand; iii) if it is determined that said profile is relevant, analyzing it to determine whether it is legitimate or malicious; and iv) if it is determined that the profile is malicious, assembling proof of its malicious activity and submitting same together with a takedown request to the administrator of the website where the profile was located.
    Type: Application
    Filed: December 1, 2020
    Publication date: June 24, 2021
    Applicant: INTSIGHTS CYBER INTELLIGENCE LTD
    Inventors: Gal Ben David, Amir Hozez, Alon Arvatz, Guy Nizan
  • Publication number: 20210176274
    Abstract: Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.
    Type: Application
    Filed: December 18, 2018
    Publication date: June 10, 2021
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal BEN DAVID, Amir HOZEZ, Alon ARVATZ, Guy NIZAN
  • Publication number: 20200296081
    Abstract: Systems and methods of mitigating leakage of credentials of a user of a computer network, including monitoring at least one data source to scrape data that is compatible with credential data, applying a machine learning algorithm to the scraped data to identify at least one potential leaked credential, wherein the at least one potential leaked credential is identified using at least one neural network, authenticating the identified at least one potential leaked credential by a database of valid credentials of the computer network, and replacing credentials corresponding to the at least one leaked credential.
    Type: Application
    Filed: March 13, 2019
    Publication date: September 17, 2020
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal BEN DAVID, Amir Hozez, Alon Arvatz, Guy Nizan
  • Publication number: 20200218804
    Abstract: A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 9, 2020
    Applicant: IntSights Cyber Intelligence Ltd.
    Inventors: Gal BEN DAVID, Amir Hozez, Alon Arvatz, Guy Nizan, Shmuel UR