DETECTING AND PREVENTING CODE EXECUTION VULNERABILITY

    公开(公告)号:US20240386113A1

    公开(公告)日:2024-11-21

    申请号:US18198138

    申请日:2023-05-16

    Inventor: Abhishek Singh

    Abstract: Techniques are described for protecting services containing web applications from malicious attacks. A data flow that includes a stack trace and a process is received from a web application. The stack trace is chained with the process to generate a data flow graph. A data lake is then accessed to determine whether the data flow graph is in the data lake. If the data flow graph is not in the data lake, then the data flow can be considered safe. If the data flow graph is not already in the data lake, then a determination is made as to whether the data flow includes a command that accepts user input. If it is determined that the data flow does include a command that accepts user input, then the data flow can be considered to be malicious and the process is terminated to protect the web application from a malicious attack.

    AUTOMATED EMAIL ACCOUNT COMPRISE DETECTION AND REMEDIATION

    公开(公告)号:US20240333761A1

    公开(公告)日:2024-10-03

    申请号:US18126827

    申请日:2023-03-27

    CPC classification number: H04L63/1483 H04L63/0236

    Abstract: Techniques and architecture are described for detecting a compromised mailbox as an email account compromise (EAC) involved in lateral phishing, lateral scam, lateral BEC, outbound scam, lateral and inbound fraudulent money transfer requests. For example, the techniques and architecture provide a method that comprises scanning, by a pre-filter, electronic mail messages (emails) within an organization, wherein the emails originate within the organization. The pre-filter analyzes the emails with respect to known fraudulent email practices and determines that an email is a questionable email. A retrospective behavior engine analyzes the questionable email with respect to one or more historical traits to provide a feature set. Based at least in part on the feature set, the verdict correlation engine determines that the questionable email belongs in a class of emails from multiple classes of emails. Based at least in part on the class, the verdict correlation engine performs a responsive action.

    ALGORITHM TO DETECT MALICIOUS EMAILS IMPERSONATING BRANDS

    公开(公告)号:US20230328034A1

    公开(公告)日:2023-10-12

    申请号:US17867464

    申请日:2022-07-18

    CPC classification number: H04L63/0236 H04L63/1483 H04L63/1408

    Abstract: Techniques for an email-security system to screen emails, extract information from the emails, analyze the information, assign probability scores to the emails, and classify the emails as likely fraudulent or not. The system may analyze emails for users and identify fraudulent emails by analyzing the contents of the emails. The system may evaluate the contents of the emails to determine probability score(s) which may further determine an overall probability score. The system may then classify the email as fraudulent, or not, and may perform actions including blocking the email, allowing the email, flagging the email, etc. In some instances, the screened emails may include legitimate brand domain addresses, names, images, URL(s), and the like. However, the screened emails may contain a reply-to domain address that matches a free email service provider domain. In such instances, the email-security system may assign a probability score indicative that the screened email is fraudulent.

Patent Agency Ranking