MA66045A1 - A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks. - Google Patents
A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks.Info
- Publication number
- MA66045A1 MA66045A1 MA66045A MA66045A MA66045A1 MA 66045 A1 MA66045 A1 MA 66045A1 MA 66045 A MA66045 A MA 66045A MA 66045 A MA66045 A MA 66045A MA 66045 A1 MA66045 A1 MA 66045A1
- Authority
- MA
- Morocco
- Prior art keywords
- information
- threat intelligence
- phishing attacks
- automated simulation
- victims
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Linvention concerne un système et une méthode de cybersécurité permettant de prédire de manière proactive le risque de violation des données, grâce à l'utilisation de simulations dattaque par hameçonnage (phishing) automatisées. La méthode comprend la réception d'une pluralité d'informations sur les victimes ; la classification de ces informations pour attribuer un ensemble de types dinformations ; l'attribution d'un ensemble de catégories aux victimes ; l'utilisation des informations classifiées sur les victimes pour simuler une attaque par hameçonnage ; et le calcul d'un score de prédiction de violation de données pour chaque victime catégorisée.The invention relates to a cybersecurity system and method for proactively predicting the risk of data breaches through the use of automated phishing attack simulations. The method comprises receiving multiple pieces of information about victims; classifying this information to assign a set of information types; assigning a set of categories to victims; using the classified victim information to simulate a phishing attack; and calculating a data breach prediction score for each categorized victim.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MA66045A MA66045A1 (en) | 2024-05-28 | 2024-05-28 | A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks. |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MA66045A MA66045A1 (en) | 2024-05-28 | 2024-05-28 | A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks. |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MA66045A1 true MA66045A1 (en) | 2025-11-28 |
Family
ID=98218044
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MA66045A MA66045A1 (en) | 2024-05-28 | 2024-05-28 | A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks. |
Country Status (1)
| Country | Link |
|---|---|
| MA (1) | MA66045A1 (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2676197A1 (en) * | 2011-02-18 | 2013-12-25 | CSidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
| US11829486B1 (en) * | 2023-02-08 | 2023-11-28 | BobaGuard LLP | Apparatus and method for enhancing cybersecurity of an entity |
| US20230421587A1 (en) * | 2022-06-24 | 2023-12-28 | Crowdstrike, Inc. | Distributed Digital Security System for Predicting Malicious Behavior |
-
2024
- 2024-05-28 MA MA66045A patent/MA66045A1/en unknown
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2676197A1 (en) * | 2011-02-18 | 2013-12-25 | CSidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
| US20230421587A1 (en) * | 2022-06-24 | 2023-12-28 | Crowdstrike, Inc. | Distributed Digital Security System for Predicting Malicious Behavior |
| US11829486B1 (en) * | 2023-02-08 | 2023-11-28 | BobaGuard LLP | Apparatus and method for enhancing cybersecurity of an entity |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111160749B (en) | Method and device for intelligence quality assessment and intelligence fusion | |
| CN108764267B (en) | Denial of service attack detection method based on countermeasure decision tree integration | |
| CN116506217A (en) | Analysis method, system, storage medium and terminal for business data flow security risk | |
| CN116846619A (en) | Automatic network security risk assessment method, system and readable storage medium | |
| CN119484153B (en) | A vulnerability accessibility rating method based on EPSS | |
| Kusak | Quality of data sets that feed AI and big data applications for law enforcement | |
| JP2019219898A (en) | Security countermeasures investigation tool | |
| CN118012775B (en) | Reinforcing test method based on kernel protection server data | |
| CN110751316A (en) | Method and device for predicting resolution result and terminal equipment | |
| MA66045A1 (en) | A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks. | |
| Paiva et al. | Assessing the suitability of social media data for identifying crisis events in smart cities: an exploratory study on flood situations | |
| Tumbinskaya et al. | Analysis and forecast of undesirable cloud services traffic | |
| Gnatyuk et al. | Method for cybersecurity level evaluation in the civil aviation critical infrastructure | |
| CN118585656A (en) | A knowledge base construction method for network security | |
| Mussiraliyeva et al. | Identifying cyber-threatening texts in the kazakh segment of web resources | |
| CN114598509B (en) | A method and device for determining vulnerability results | |
| CN118210619A (en) | Task processing method and electronic equipment | |
| Debbarma | The legal framework and challenges in prosecuting cybercrimes including Hacking, identity Theft, and online fraud | |
| Tardelli et al. | Cyber intelligence and social media analytics: current research trends and challenges | |
| Zhang | Media and pollution in China: Mouthpiece or watchdog? | |
| Sanz | Improving disaster response by combining automated text information extraction from images and text on social media | |
| Gavrilă | Ethical and legal challenges of artificial intelligence in intelligence: Between operational efficiency and respect for fundamental rights | |
| US20200394312A1 (en) | System and method for organization and classification of application security vulnerabilities | |
| CN115022082B (en) | Network security detection method, network security detection system, terminal and medium | |
| Leszczuk et al. | Selected aspects of the new recommendation on subjective methods of assessing video quality in recognition tasks |