Patents by Inventor Udi REITBLAT

Udi REITBLAT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250211609
    Abstract: A system and method for validating cybersecurity issues utilizing runtime data is disclosed. In an embodiment the method includes: inspecting a workload deployed in a computing environment for a cybersecurity issue; deploying a sensor on the workload, the sensor configured to collect runtime data from the workload; initiating a first mitigation action with a first priority in the computing environment in response to validating the cybersecurity issue from the collected runtime data; initiating a second mitigation action with a second priority, which is lower than the first priority, in response to failing to validate the cybersecurity issue from the collected runtime data.
    Type: Application
    Filed: August 8, 2024
    Publication date: June 26, 2025
    Applicant: Wiz, Inc.
    Inventors: Arik NEMTSOV, Shai KEREN, Udi REITBLAT, Gal DE LEON, Yonatan DORON, Eliad PELLER
  • Publication number: 20250193252
    Abstract: A system and method for generating a security graph utilizing a unified model based on multiple cloud environments are provided. The method includes receiving data from a first cloud environment pertaining to: resources, principals, and permissions; generating for each resource a corresponding resource node in the security graph, the corresponding resource node including an identifier of the resource, wherein the resource is a cloud entity deployed in the first cloud environment; generating for each principal a corresponding principal node in the security graph, the corresponding principal node including an identifier of the principal, wherein the principal is a cloud entity in the first cloud environment that generates an operation request in the first cloud environment; and generating a connection between at least a principal node and at least a resource node in the security graph, in response to detecting a permission indicating that a principal can access a resource.
    Type: Application
    Filed: February 5, 2025
    Publication date: June 12, 2025
    Applicant: Wiz, Inc.
    Inventors: Avihai BERKOVITZ, George PISHA, Yaniv Joseph OLIVER, Udi REITBLAT
  • Publication number: 20250141913
    Abstract: A system and method for inspecting a resource deployed in a cloud computing environment for a cybersecurity threat is presented. The method includes detecting a virtual instance deployed in a cloud computing environment, the virtual instance associated with an original disk; generating a cloned disk directly based on the original disk, wherein the original disk is provisioned storage from a cloud storage system; generating a cloned disk descriptor associated with the cloned disk, the cloned disk descriptor pointing to the provisioned storage; inspecting the cloned disk for a cybersecurity object, the cybersecurity object indicating a cybersecurity risk; and releasing the cloned disk in response to completing inspection of the cloned disk.
    Type: Application
    Filed: December 30, 2024
    Publication date: May 1, 2025
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Avihai BERKOVITZ, George PISHA, Yaniv Joseph OLIVER, Udi REITBLAT, Or HELLER, Raaz HERZBERG, Osher HAZAN, Niv Roit BEN DAVID
  • Publication number: 20250126138
    Abstract: A system and method for detecting cybersecurity risk on a resource in a computing environment utilizes static analysis of a cloned resource and runtime data from the live resource. The method includes: configuring a resource deployed in a computing environment to deploy thereon a sensor, the sensor configured to detect runtime data; detecting runtime data from the sensor of the resource; generating an inspectable disk based on an original disk of the resource; initiating inspection based on the detected runtime data for a cybersecurity object on the inspectable disk; detecting the cybersecurity object on an inspectable disk; and initiating a mitigation action on the resource.
    Type: Application
    Filed: December 17, 2024
    Publication date: April 17, 2025
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL
  • Patent number: 12278819
    Abstract: A system and method for detecting effective permissions of a principal in a cloud computing environment, includes detecting a group of principal nodes, each principal node representing a principal in a cloud computing environment, in a security graph, the security graph storing therein a representation of the cloud computing environment; selecting a first principal node from the group of principal nodes; determining a permission between the first principal node and a resource node, wherein the resource node represents a resource deployed in the cloud computing environment; and associating the group of principal nodes with the determined permission.
    Type: Grant
    Filed: July 15, 2022
    Date of Patent: April 15, 2025
    Assignee: Wiz, Inc.
    Inventors: Avihai Berkovitz, George Pisha, Yaniv Joseph Oliver, Udi Reitblat
  • Patent number: 12278840
    Abstract: A system and method for generating a security graph utilizing a unified model based on multiple cloud environments are provided. The method includes receiving data from a first cloud environment pertaining to: resources, principals, and permissions; generating for each resource a corresponding resource node in the security graph, the corresponding resource node including an identifier of the resource, wherein the resource is a cloud entity deployed in the first cloud environment; generating for each principal a corresponding principal node in the security graph, the corresponding principal node including an identifier of the principal, wherein the principal is a cloud entity in the first cloud environment that generates an operation request in the first cloud environment; and generating a connection between at least a principal node and at least a resource node in the security graph, in response to detecting a permission indicating that a principal can access a resource.
    Type: Grant
    Filed: March 14, 2022
    Date of Patent: April 15, 2025
    Assignee: Wiz, Inc.
    Inventors: Avihai Berkovitz, George Pisha, Yaniv Joseph Oliver, Udi Reitblat
  • Patent number: 12278825
    Abstract: A system and method for improved endpoint detection and response (EDR) in a cloud computing environment initiates inspection based on data received from a sensor deployed on a workload. The method includes: configuring a resource, deployed in a cloud computing environment, to deploy thereon a sensor, the sensor configured to detect runtime data; detecting a potential cybersecurity threat on the resource based on detected runtime data received from the sensor; and initiating inspection of the resource for the potential cybersecurity threat.
    Type: Grant
    Filed: August 28, 2023
    Date of Patent: April 15, 2025
    Assignee: Wiz, Inc.
    Inventors: Aviel Fogel, Udi Reitblat, Alon Schindel, Ami Luttwak, Roy Reznik, Yinon Costica
  • Patent number: 12244634
    Abstract: A system and method for detecting a permission escalation event in a computing environment is disclosed. The method includes: generating a cloned disk based on an original disk of a resource deployed in a computing environment; detecting an identifier of a first principal on the cloned disk; detecting a second principal in the computing environment, the first principal authorized to assume the first principal; storing a representation of the computing environment in a security database, including: a first principal node representing the first principal, and a second principal node representing the second principal, further associated with a permission; querying the representation to determine a permission of the first principal; determining that the second principal includes a permission which the first principal does not include based on a result of querying the representation; and generating a permission escalation event.
    Type: Grant
    Filed: April 26, 2024
    Date of Patent: March 4, 2025
    Assignee: Wiz, Inc.
    Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Avihai Berkovitz, George Pisha, Yaniv Joseph Oliver, Udi Reitblat, Or Heller, Raaz Herzberg, Osher Hazan, Niv Roit Ben David
  • Patent number: 12212586
    Abstract: A system and method for detecting cybersecurity risk on a resource in a computing environment utilizes static analysis of a cloned resource and runtime data from the live resource. The method includes: configuring a resource deployed in a computing environment to deploy thereon a sensor, the sensor configured to detect runtime data; detecting runtime data from the sensor of the resource; generating an inspectable disk based on an original disk of the resource; initiating inspection based on the detected runtime data for a cybersecurity object on the inspectable disk; detecting the cybersecurity object on an inspectable disk; and initiating a mitigation action on the resource.
    Type: Grant
    Filed: January 31, 2024
    Date of Patent: January 28, 2025
    Assignee: Wiz, Inc.
    Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Aviel Fogel, Udi Reitblat, Alon Schindel
  • Patent number: 12095806
    Abstract: A system and method for validating cybersecurity issues utilizing runtime data is disclosed. In an embodiment the method includes: inspecting a workload deployed in a computing environment for a cybersecurity issue; deploying a sensor on the workload, the sensor configured to collect runtime data from the workload; initiating a first mitigation action with a first priority in the computing environment in response to validating the cybersecurity issue from the collected runtime data; initiating a second mitigation action with a second priority, which is lower than the first priority, in response to failing to validate the cybersecurity issue from the collected runtime data.
    Type: Grant
    Filed: December 21, 2023
    Date of Patent: September 17, 2024
    Assignee: Wiz, Inc.
    Inventors: Arik Nemtsov, Shai Keren, Udi Reitblat, Gal De Leon, Yonatan Doron, Eliad Peller
  • Publication number: 20240275812
    Abstract: A system and method for detecting a permission escalation event in a computing environment is disclosed. The method includes: generating a cloned disk based on an original disk of a resource deployed in a computing environment; detecting an identifier of a first principal on the cloned disk; detecting a second principal in the computing environment, the first principal authorized to assume the first principal; storing a representation of the computing environment in a security database, including: a first principal node representing the first principal, and a second principal node representing the second principal, further associated with a permission; querying the representation to determine a permission of the first principal; determining that the second principal includes a permission which the first principal does not include based on a result of querying the representation; and generating a permission escalation event.
    Type: Application
    Filed: April 26, 2024
    Publication date: August 15, 2024
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Avihai BERKOVITZ, George PISHA, Yaniv Joseph OLIVER, Udi REITBLAT, Or HELLER, Raaz HERZBERG, Osher HAZAN, Niv Roit BEN DAVID
  • Publication number: 20240244065
    Abstract: A system and method for detecting cybersecurity risk on a resource in a computing environment utilizes static analysis of a cloned resource and runtime data from the live resource. The method includes: configuring a resource deployed in a computing environment to deploy thereon a sensor, the sensor configured to detect runtime data; detecting runtime data from the sensor of the resource; generating an inspectable disk based on an original disk of the resource; initiating inspection based on the detected runtime data for a cybersecurity object on the inspectable disk; detecting the cybersecurity object on an inspectable disk; and initiating a mitigation action on the resource.
    Type: Application
    Filed: January 31, 2024
    Publication date: July 18, 2024
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL
  • Publication number: 20240137382
    Abstract: A system and method for detecting a permission escalation event in a computing environment is disclosed. The method includes: generating a cloned disk based on an original disk of a resource deployed in a computing environment; detecting an identifier of a first principal on the cloned disk; detecting a second principal in the computing environment, the first principal authorized to assume the first principal; storing a representation of the computing environment in a security database, including: a first principal node representing the first principal, and a second principal node representing the second principal, further associated with a permission; querying the representation to determine a permission of the first principal; determining that the second principal includes a permission which the first principal does not include based on a result of querying the representation; and generating a permission escalation event.
    Type: Application
    Filed: December 29, 2023
    Publication date: April 25, 2024
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Avihai BERKOVITZ, George PISHA, Yaniv Joseph OLIVER, Udi REITBLAT, Or HELLER, Raaz HERZBERG, Osher HAZAN, Niv Roit BEN DAVID
  • Publication number: 20240119145
    Abstract: A system and method for improved endpoint detection and response (EDR) in a cloud computing environment initiates inspection based on data received from a sensor deployed on a workload. The method includes: configuring a resource, deployed in a cloud computing environment, to deploy thereon a sensor, the sensor configured to detect runtime data; detecting a potential cybersecurity threat on the resource based on detected runtime data received from the sensor; and initiating inspection of the resource for the potential cybersecurity threat.
    Type: Application
    Filed: August 28, 2023
    Publication date: April 11, 2024
    Applicant: Wiz, Inc.
    Inventors: Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
  • Publication number: 20240089272
    Abstract: A system and method for reducing false positive detection of cybersecurity events is disclosed.
    Type: Application
    Filed: July 28, 2023
    Publication date: March 14, 2024
    Applicant: Wiz, Inc.
    Inventors: Itamar GILAD, Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
  • Patent number: 11841945
    Abstract: A system and method for improved endpoint detection and response (EDR) in a cloud computing environment configures a resource deployed in a cloud computing environment to deploy thereon a sensor, configured to listen on a data link layer for an event. The method further includes detecting a potential cybersecurity threat on the resource; sending a definition based on the cybersecurity threat to the sensor, wherein the definition includes a logical expression, which when applied to an event produces a binary outcome, and wherein the sensor is further configured to apply the definition to the event; determining that the potential cybersecurity threat is an actual cybersecurity threat in response to the produced binary outcome having a predetermined value; and generating an instruction to perform a mitigation action based on the actual cybersecurity threat.
    Type: Grant
    Filed: October 7, 2022
    Date of Patent: December 12, 2023
    Assignee: WIZ, INC.
    Inventors: Aviel Fogel, Udi Reitblat, Alon Schindel, Ami Luttwak, Roy Reznik, Yinon Costica
  • Publication number: 20230388352
    Abstract: A system and method for detecting a cybersecurity event based on multiple cybersecurity data sources is disclosed. The method includes: receiving data from a first cybersecurity source, the first cybersecurity source configured to generate data based on a resource deployed in a computing environment; receiving data from a second cybersecurity source, the second cybersecurity source configured to generate data based on the resource deployed in the computing environment, wherein the second cybersecurity source has a source type which is different from a source type of the first cybersecurity source; detecting a cybersecurity event on the resource based on data received from the first cybersecurity source and data received from the second cybersecurity source; and initiating a mitigation action for the resource in response to detecting the cybersecurity event.
    Type: Application
    Filed: July 28, 2023
    Publication date: November 30, 2023
    Applicant: Wiz, Inc.
    Inventors: Itamar GILAD, Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
  • Publication number: 20230388325
    Abstract: A system and method for detecting privilege escalation on a resource deployed in a computing environment is disclosed. The method includes: configuring the resource to deploy thereon a sensor, the sensor configured to listen on a data link layer of the resource for an event; receiving from the sensor a permission-based event based on a first actor, the permission-based event indicating a first permission set of the first actor; querying a database to detect a second permission set of the first actor; detecting that the first permission set includes a permission which is not in the second permission set; determining that the resource is involved in a privilege escalation event in response to detecting that the first permission set includes a permission which is not in the second permission set; and initiating a mitigation action in response to the determined privilege escalation event.
    Type: Application
    Filed: July 28, 2023
    Publication date: November 30, 2023
    Applicant: Wiz, Inc.
    Inventors: Itamar GILAD, Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
  • Publication number: 20230379342
    Abstract: A system and method for reducing network communication from a sensor for detecting cybersecurity threats is disclosed. The method includes: configuring the resource to deploy thereon a sensor, the sensor configured to listen on a data link layer of the resource for an event; configuring the sensor to generate an event set from a plurality of events, based on a rule; detecting that a number of events in the event set exceeds a predetermined threshold; determining that a cybersecurity event occurred in response to detecting that the number of events exceeds the predetermined threshold; and initiating a mitigation action based on the cybersecurity event.
    Type: Application
    Filed: July 28, 2023
    Publication date: November 23, 2023
    Applicant: Wiz, Inc.
    Inventors: Itamar GILAD, Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA