System And Method for Performing Security Analyses of Digital Assets

    公开(公告)号:US20240289474A1

    公开(公告)日:2024-08-29

    申请号:US18173428

    申请日:2023-02-23

    IPC分类号: G06F21/62 G06F21/53

    摘要: A system and method are provided for assessing potentially malicious data files. The method includes receiving a data file possessing one or more unknown security characteristics, and providing an interface for enabling automatic selection of at least one of a plurality of analysis tools to determine the one or more unknown security characteristics. The method includes automatically determining the selected at least one of the plurality of analysis tools to be applied to the received data file, and automatically providing the data file to each of the at least one selected analysis tool to have at least one corresponding analysis performed to determine one or more of the unknown security characteristics. The method includes receiving results generated by the at least one selected analysis tool, and aggregating and outputting the results in a review interface.

    System and Method for Determining a Physical Location Associated with an Activity Detected on a Mobile Device

    公开(公告)号:US20230064926A1

    公开(公告)日:2023-03-02

    申请号:US17459064

    申请日:2021-08-27

    发明人: Michael AVNI

    摘要: A system and method for determining physical locations associated with activities detected on mobile devices is disclosed. The method includes accessing at least one enterprise rule set which is based on a plurality of security vulnerability events, and for monitoring at least one application used on the mobile devices. Device data indicative of one or more actions performed on a mobile device and a time associated with each action is used to detect whether actions performed on the mobile device breach a rule of the enterprise rule set. Geolocation information associated with the mobile device at the time associated with the breach is received based on an identifier associated with the mobile device or with wireless network access points in range of the mobile device. The received geolocation information, enterprise rules, and device data is used determine if a security vulnerability is associated with the mobile device.