| Utility: SYSTEMS AND METHODS FOR ATTACK SIMULATION ON A PRODUCTION NETWORK Filling date: 8 Sep 2025 Issue date: 10 Dec 2020 | 24 Aug 2020 | 10 Dec 2020 |
| Utility: Automated Enforcement of Security Policies in Cloud and Hybrid Infrastructure Environments Filling date: 8 Sep 2025 Issue date: 10 Dec 2020 | 22 Jun 2020 | 10 Dec 2020 |
| Utility: Post-intrusion detection of cyber-attacks during lateral movement within networks Filling date: 8 Sep 2025 Issue date: 1 Dec 2020 | 29 Jun 2018 | 1 Dec 2020 |
| Utility: Malicious content analysis using simulated user interaction without user involvement Filling date: 8 Sep 2025 Issue date: 24 Nov 2020 | 5 Mar 2018 | 24 Nov 2020 |
| Utility: System and method for enforcing compliance with subscription requirements for cyber-attack detection service Filling date: 8 Sep 2025 Issue date: 24 Nov 2020 | 29 Sep 2017 | 24 Nov 2020 |
| Utility: Technique for establishing secure communication between host and guest processes of a virtualization architecture Filling date: 8 Sep 2025 Issue date: 24 Nov 2020 | 15 Aug 2016 | 24 Nov 2020 |
| Utility: Launcher for setting analysis environment variations for malware detection Filling date: 8 Sep 2025 Issue date: 10 Nov 2020 | 6 May 2019 | 10 Nov 2020 |
| Utility: System and method for identifying phishing cyber-attacks through deep machine learning via a convolutional neural network (CNN) engine Filling date: 8 Sep 2025 Issue date: 10 Nov 2020 | 8 Jun 2018 | 10 Nov 2020 |
| Utility: System and method for predicting and mitigating cybersecurity system misconfigurations Filling date: 8 Sep 2025 Issue date: 3 Nov 2020 | 29 Mar 2018 | 3 Nov 2020 |
| Utility: Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints Filling date: 8 Sep 2025 Issue date: 3 Nov 2020 | 7 Sep 2016 | 3 Nov 2020 |
| Utility: METHODS AND APPARATUS FOR GRAPHICAL USER INTERFACE ENVIRONMENT FOR CREATING THREAT RESPONSE COURSES OF ACTION FOR COMPUTER NETWORKS Filling date: 8 Sep 2025 Issue date: 29 Oct 2020 | 18 Dec 2019 | 29 Oct 2020 |
| Utility: Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic Filling date: 8 Sep 2025 Issue date: 27 Oct 2020 | 29 Jun 2016 | 27 Oct 2020 |
| Utility: Correlation and consolidation holistic views of analytic data pertaining to a malware attack Filling date: 8 Sep 2025 Issue date: 20 Oct 2020 | 5 Nov 2018 | 20 Oct 2020 |
| Utility: Phishing attack detection Filling date: 8 Sep 2025 Issue date: 13 Oct 2020 | 1 Oct 2017 | 13 Oct 2020 |
| Utility: Infection vector and malware tracking with an interactive user display Filling date: 8 Sep 2025 Issue date: 13 Oct 2020 | 26 Jun 2014 | 13 Oct 2020 |
| Utility: Attribute-controlled malware detection Filling date: 8 Sep 2025 Issue date: 6 Oct 2020 | 29 Mar 2018 | 6 Oct 2020 |
| Utility: Intelligent context aware user interaction for malware detection Filling date: 8 Sep 2025 Issue date: 6 Oct 2020 | 4 Dec 2017 | 6 Oct 2020 |
| Utility: Enterprise search Filling date: 8 Sep 2025 Issue date: 6 Oct 2020 | 3 Nov 2017 | 6 Oct 2020 |
| Utility: METHODS AND APPARATUS FOR GRAPHICAL USER INTERFACE ENVIRONMENT FOR CREATING THREAT RESPONSE COURSES OF ACTION FOR COMPUTER NETWORKS Filling date: 8 Sep 2025 Issue date: 1 Oct 2020 | 18 Dec 2019 | 1 Oct 2020 |
| Utility: Subscription-based malware detection Filling date: 8 Sep 2025 Issue date: 29 Sep 2020 | 29 Mar 2018 | 29 Sep 2020 |
| Utility: Cluster configuration within a scalable malware detection system Filling date: 8 Sep 2025 Issue date: 22 Sep 2020 | 30 Sep 2016 | 22 Sep 2020 |
| Utility: Systems and methods for attack simulation on a production network Filling date: 8 Sep 2025 Issue date: 25 Aug 2020 | 11 Mar 2019 | 25 Aug 2020 |
| Utility: System and method for detecting and remediating a cybersecurity attack Filling date: 8 Sep 2025 Issue date: 25 Aug 2020 | 24 Sep 2018 | 25 Aug 2020 |
| Utility: Malicious network content detection Filling date: 8 Sep 2025 Issue date: 25 Aug 2020 | 16 Jul 2018 | 25 Aug 2020 |
| Utility: System and method for preventing malware evasion Filling date: 8 Sep 2025 Issue date: 18 Aug 2020 | 27 Sep 2017 | 18 Aug 2020 |
| Utility: Threat-aware architecture Filling date: 8 Sep 2025 Issue date: 11 Aug 2020 | 16 Apr 2018 | 11 Aug 2020 |
| Utility: SYSTEM AND METHOD FOR DETECTING CYBERATTACKS IMPERSONATING LEGITIMATE SOURCES Filling date: 8 Sep 2025 Issue date: 6 Aug 2020 | 23 Dec 2019 | 6 Aug 2020 |
| Utility: Detection center to detect targeted malware Filling date: 8 Sep 2025 Issue date: 4 Aug 2020 | 17 Apr 2017 | 4 Aug 2020 |
| Utility: DYNAMIC ADAPTIVE DEFENSE FOR CYBER-SECURITY THREATS Filling date: 8 Sep 2025 Issue date: 30 Jul 2020 | 6 Apr 2020 | 30 Jul 2020 |
| Utility: Analytic-based security monitoring system and method Filling date: 8 Sep 2025 Issue date: 28 Jul 2020 | 15 Oct 2018 | 28 Jul 2020 |
| Utility: System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer Filling date: 8 Sep 2025 Issue date: 28 Jul 2020 | 30 Jun 2016 | 28 Jul 2020 |
| Utility: Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses Filling date: 8 Sep 2025 Issue date: 14 Jul 2020 | 5 Mar 2018 | 14 Jul 2020 |
| Utility: Mobile application risk analysis Filling date: 8 Sep 2025 Issue date: 14 Jul 2020 | 30 Jun 2016 | 14 Jul 2020 |
| Utility: System and method to extract and utilize disassembly features to classify software intent Filling date: 8 Sep 2025 Issue date: 14 Jul 2020 | 19 Apr 2013 | 14 Jul 2020 |
| Utility: Detecting delayed activation malware using a primary controller and plural time controllers Filling date: 8 Sep 2025 Issue date: 7 Jul 2020 | 29 Jun 2016 | 7 Jul 2020 |
| Utility: System and method for verifying a cyberthreat Filling date: 8 Sep 2025 Issue date: 30 Jun 2020 | 23 Jul 2018 | 30 Jun 2020 |
| Utility: Timeout management services Filling date: 8 Sep 2025 Issue date: 2 Jun 2020 | 27 Dec 2016 | 2 Jun 2020 |
| Utility: System and method for malware analysis using thread-level event monitoring Filling date: 8 Sep 2025 Issue date: 2 Jun 2020 | 22 Sep 2014 | 2 Jun 2020 |
| Utility: Virtualized exploit detection system Filling date: 8 Sep 2025 Issue date: 26 May 2020 | 3 Dec 2018 | 26 May 2020 |
| Utility: Multistage system and method for analyzing obfuscated content for malware Filling date: 8 Sep 2025 Issue date: 19 May 2020 | 26 Jun 2017 | 19 May 2020 |
| Utility: System and method for protecting a software component running in virtual machine using a virtualization layer Filling date: 8 Sep 2025 Issue date: 5 May 2020 | 30 Jun 2016 | 5 May 2020 |
| Utility: Classifying sets of malicious indicators for detecting command and control communications associated with malware Filling date: 8 Sep 2025 Issue date: 28 Apr 2020 | 23 Jul 2018 | 28 Apr 2020 |
| Utility: System and method for virtual analysis of network data Filling date: 8 Sep 2025 Issue date: 14 Apr 2020 | 5 Mar 2018 | 14 Apr 2020 |
| Utility: Method to detect forgery and exploits using last branch recording registers Filling date: 8 Sep 2025 Issue date: 14 Apr 2020 | 29 Jun 2016 | 14 Apr 2020 |
| Utility: Dynamic adaptive defense for cyber-security threats Filling date: 8 Sep 2025 Issue date: 7 Apr 2020 | 9 Nov 2018 | 7 Apr 2020 |
| Utility: Distributed malware detection system and submission workflow thereof Filling date: 8 Sep 2025 Issue date: 7 Apr 2020 | 30 Sep 2016 | 7 Apr 2020 |
| Utility: INTELLIGENT SYSTEM FOR MITIGATING CYBERSECURITY RISK BY ANALYZING DOMAIN NAME SYSTEM TRAFFIC METRICS Filling date: 8 Sep 2025 Issue date: 2 Apr 2020 | 28 Sep 2018 | 2 Apr 2020 |
| Utility: INTELLIGENT SYSTEM FOR MITIGATING CYBERSECURITY RISK BY ANALYZING DOMAIN NAME SYSTEM TRAFFIC Filling date: 8 Sep 2025 Issue date: 2 Apr 2020 | 28 Sep 2018 | 2 Apr 2020 |
| Utility: Cyber-security system and method for weak indicator detection and correlation to generate strong indicators Filling date: 8 Sep 2025 Issue date: 24 Mar 2020 | 29 Jun 2017 | 24 Mar 2020 |
| Utility: System and method for managing sensor enrollment Filling date: 8 Sep 2025 Issue date: 24 Mar 2020 | 30 Sep 2016 | 24 Mar 2020 |