[go: up one dir, main page]

MA66045A1 - A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks. - Google Patents

A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks.

Info

Publication number
MA66045A1
MA66045A1 MA66045A MA66045A MA66045A1 MA 66045 A1 MA66045 A1 MA 66045A1 MA 66045 A MA66045 A MA 66045A MA 66045 A MA66045 A MA 66045A MA 66045 A1 MA66045 A1 MA 66045A1
Authority
MA
Morocco
Prior art keywords
information
threat intelligence
phishing attacks
automated simulation
victims
Prior art date
Application number
MA66045A
Other languages
French (fr)
Inventor
Bajeddi Amine
Sabri Marouane
Nassiri Charafeddine
Original Assignee
Defendis
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Defendis filed Critical Defendis
Priority to MA66045A priority Critical patent/MA66045A1/en
Publication of MA66045A1 publication Critical patent/MA66045A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

Linvention concerne un système et une méthode de cybersécurité permettant de prédire de manière proactive le risque de violation des données, grâce à l'utilisation de simulations dattaque par hameçonnage (phishing) automatisées. La méthode comprend la réception d'une pluralité d'informations sur les victimes ; la classification de ces informations pour attribuer un ensemble de types dinformations ; l'attribution d'un ensemble de catégories aux victimes ; l'utilisation des informations classifiées sur les victimes pour simuler une attaque par hameçonnage ; et le calcul d'un score de prédiction de violation de données pour chaque victime catégorisée.The invention relates to a cybersecurity system and method for proactively predicting the risk of data breaches through the use of automated phishing attack simulations. The method comprises receiving multiple pieces of information about victims; classifying this information to assign a set of information types; assigning a set of categories to victims; using the classified victim information to simulate a phishing attack; and calculating a data breach prediction score for each categorized victim.

MA66045A 2024-05-28 2024-05-28 A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks. MA66045A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
MA66045A MA66045A1 (en) 2024-05-28 2024-05-28 A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MA66045A MA66045A1 (en) 2024-05-28 2024-05-28 A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks.

Publications (1)

Publication Number Publication Date
MA66045A1 true MA66045A1 (en) 2025-11-28

Family

ID=98218044

Family Applications (1)

Application Number Title Priority Date Filing Date
MA66045A MA66045A1 (en) 2024-05-28 2024-05-28 A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks.

Country Status (1)

Country Link
MA (1) MA66045A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2676197A1 (en) * 2011-02-18 2013-12-25 CSidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US11829486B1 (en) * 2023-02-08 2023-11-28 BobaGuard LLP Apparatus and method for enhancing cybersecurity of an entity
US20230421587A1 (en) * 2022-06-24 2023-12-28 Crowdstrike, Inc. Distributed Digital Security System for Predicting Malicious Behavior

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2676197A1 (en) * 2011-02-18 2013-12-25 CSidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US20230421587A1 (en) * 2022-06-24 2023-12-28 Crowdstrike, Inc. Distributed Digital Security System for Predicting Malicious Behavior
US11829486B1 (en) * 2023-02-08 2023-11-28 BobaGuard LLP Apparatus and method for enhancing cybersecurity of an entity

Similar Documents

Publication Publication Date Title
CN111160749B (en) Method and device for intelligence quality assessment and intelligence fusion
CN108764267B (en) Denial of service attack detection method based on countermeasure decision tree integration
CN116506217A (en) Analysis method, system, storage medium and terminal for business data flow security risk
CN116846619A (en) Automatic network security risk assessment method, system and readable storage medium
CN119484153B (en) A vulnerability accessibility rating method based on EPSS
Kusak Quality of data sets that feed AI and big data applications for law enforcement
JP2019219898A (en) Security countermeasures investigation tool
CN118012775B (en) Reinforcing test method based on kernel protection server data
CN110751316A (en) Method and device for predicting resolution result and terminal equipment
MA66045A1 (en) A cybersecurity method that includes the use of threat intelligence for the automated simulation of phishing attacks.
Paiva et al. Assessing the suitability of social media data for identifying crisis events in smart cities: an exploratory study on flood situations
Tumbinskaya et al. Analysis and forecast of undesirable cloud services traffic
Gnatyuk et al. Method for cybersecurity level evaluation in the civil aviation critical infrastructure
CN118585656A (en) A knowledge base construction method for network security
Mussiraliyeva et al. Identifying cyber-threatening texts in the kazakh segment of web resources
CN114598509B (en) A method and device for determining vulnerability results
CN118210619A (en) Task processing method and electronic equipment
Debbarma The legal framework and challenges in prosecuting cybercrimes including Hacking, identity Theft, and online fraud
Tardelli et al. Cyber intelligence and social media analytics: current research trends and challenges
Zhang Media and pollution in China: Mouthpiece or watchdog?
Sanz Improving disaster response by combining automated text information extraction from images and text on social media
Gavrilă Ethical and legal challenges of artificial intelligence in intelligence: Between operational efficiency and respect for fundamental rights
US20200394312A1 (en) System and method for organization and classification of application security vulnerabilities
CN115022082B (en) Network security detection method, network security detection system, terminal and medium
Leszczuk et al. Selected aspects of the new recommendation on subjective methods of assessing video quality in recognition tasks