| Utility: Subscription-based malware detection Filling date: 8 Sep 2025 Issue date: 26 Jul 2022 | 28 Sep 2020 | 26 Jul 2022 |
| Utility: System and method for supporting cross-platform data verification Filling date: 8 Sep 2025 Issue date: 19 Jul 2022 | 28 Jun 2019 | 19 Jul 2022 |
| Utility: Network-based binary file extraction and analysis for malware detection Filling date: 8 Sep 2025 Issue date: 5 Jul 2022 | 9 Sep 2014 | 5 Jul 2022 |
| Utility: System and method for scanning remote services to locate stored objects with malware Filling date: 8 Sep 2025 Issue date: 21 Jun 2022 | 21 Dec 2018 | 21 Jun 2022 |
| Utility: System and method for automatically prioritizing rules for cyber-threat detection and mitigation Filling date: 8 Sep 2025 Issue date: 26 Apr 2022 | 14 Mar 2019 | 26 Apr 2022 |
| Utility: Cyber-security system and method for detecting escalation of privileges within an access token Filling date: 8 Sep 2025 Issue date: 26 Apr 2022 | 14 Mar 2019 | 26 Apr 2022 |
| Utility: System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources Filling date: 8 Sep 2025 Issue date: 19 Apr 2022 | 30 Aug 2019 | 19 Apr 2022 |
| Utility: Selective virtualization for security threat detection Filling date: 8 Sep 2025 Issue date: 5 Apr 2022 | 16 Sep 2019 | 5 Apr 2022 |
| Utility: Dynamically remote tuning of a malware content detection system Filling date: 8 Sep 2025 Issue date: 5 Apr 2022 | 1 Jul 2019 | 5 Apr 2022 |
| Utility: Platform and method for retroactive reclassification employing a cybersecurity-based global data store Filling date: 8 Sep 2025 Issue date: 8 Mar 2022 | 17 Dec 2018 | 8 Mar 2022 |
| Utility: System and method for automatically associating cybersecurity intelligence to cyberthreat actors Filling date: 8 Sep 2025 Issue date: 22 Feb 2022 | 24 Jun 2019 | 22 Feb 2022 |
| Utility: Method to detect application execution hijacking using memory protection Filling date: 8 Sep 2025 Issue date: 8 Feb 2022 | 15 Feb 2019 | 8 Feb 2022 |
| Utility: Verification of trusted threat-aware visualization layer Filling date: 8 Sep 2025 Issue date: 8 Feb 2022 | 18 Jun 2018 | 8 Feb 2022 |
| Utility: Malware detection verification and enhancement by coordinating endpoint and malware detection systems Filling date: 8 Sep 2025 Issue date: 1 Feb 2022 | 28 Oct 2019 | 1 Feb 2022 |
| Utility: Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture Filling date: 8 Sep 2025 Issue date: 1 Feb 2022 | 17 Dec 2018 | 1 Feb 2022 |
| Utility: System and method for distributed cluster configuration monitoring and management Filling date: 8 Sep 2025 Issue date: 18 Jan 2022 | 28 Jun 2018 | 18 Jan 2022 |
| Utility: Multi-version application support and registration within a single operating system environment Filling date: 8 Sep 2025 Issue date: 28 Dec 2021 | 16 Jul 2018 | 28 Dec 2021 |
| Utility: System and method for adaptive graphical depiction and selective remediation of cybersecurity threats Filling date: 8 Sep 2025 Issue date: 14 Dec 2021 | 29 Mar 2019 | 14 Dec 2021 |
| Utility: Late load technique for deploying a virtualization layer underneath a running operating system Filling date: 8 Sep 2025 Issue date: 14 Dec 2021 | 15 Oct 2018 | 14 Dec 2021 |
| Utility: System and method for mitigating cyberattacks against processor operability by a guest process Filling date: 8 Sep 2025 Issue date: 23 Nov 2021 | 13 Sep 2018 | 23 Nov 2021 |
| Utility: Determining malware via symbolic function hash analysis Filling date: 8 Sep 2025 Issue date: 16 Nov 2021 | 20 Dec 2019 | 16 Nov 2021 |
| Utility: System and method for detecting malicious network content using virtual environment components Filling date: 8 Sep 2025 Issue date: 19 Oct 2021 | 28 Jul 2014 | 19 Oct 2021 |
| Utility: Systems and methods for attack simulation on a production network Filling date: 8 Sep 2025 Issue date: 28 Sep 2021 | 24 Feb 2017 | 28 Sep 2021 |
| Utility: Virtual system and method for securing external network connectivity Filling date: 8 Sep 2025 Issue date: 7 Sep 2021 | 30 Jun 2016 | 7 Sep 2021 |
| Utility: System and method for analyzing binary code for malware classification using artificial neural network techniques Filling date: 8 Sep 2025 Issue date: 31 Aug 2021 | 27 Oct 2017 | 31 Aug 2021 |
| Utility: System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits Filling date: 8 Sep 2025 Issue date: 10 Aug 2021 | 8 Nov 2019 | 10 Aug 2021 |
| Utility: System and method for offloading packet processing and static analysis operations Filling date: 8 Sep 2025 Issue date: 3 Aug 2021 | 21 Oct 2019 | 3 Aug 2021 |
| Utility: System and method for threat detection and identification Filling date: 8 Sep 2025 Issue date: 3 Aug 2021 | 6 May 2019 | 3 Aug 2021 |
| Utility: System and method for detecting repetitive cybersecurity attacks constituting an email campaign Filling date: 8 Sep 2025 Issue date: 27 Jul 2021 | 27 Jun 2018 | 27 Jul 2021 |
| Utility: System, apparatus and method for reconfiguring virtual machines Filling date: 8 Sep 2025 Issue date: 27 Jul 2021 | 14 Aug 2017 | 27 Jul 2021 |
| Utility: Dynamic guest image creation and rollback Filling date: 8 Sep 2025 Issue date: 20 Jul 2021 | 25 Mar 2019 | 20 Jul 2021 |
| Utility: Methods and apparatus for graphical user interface environment for creating threat response courses of action for computer networks Filling date: 8 Sep 2025 Issue date: 13 Jul 2021 | 18 Dec 2019 | 13 Jul 2021 |
| Utility: System and method of detecting delivery of malware using cross-customer data Filling date: 8 Sep 2025 Issue date: 25 May 2021 | 30 Aug 2019 | 25 May 2021 |
| Utility: System and method for automatically generating malware detection rule recommendations Filling date: 8 Sep 2025 Issue date: 11 May 2021 | 30 Mar 2018 | 11 May 2021 |
| Utility: Method and system for efficient cybersecurity analysis of endpoint events Filling date: 8 Sep 2025 Issue date: 11 May 2021 | 28 Dec 2017 | 11 May 2021 |
| Utility: Methods and apparatus for graphical user interface environment for creating threat response courses of action for computer networks Filling date: 8 Sep 2025 Issue date: 20 Apr 2021 | 18 Dec 2019 | 20 Apr 2021 |
| Utility: System and method for detecting malicious scripts through natural language processing modeling Filling date: 8 Sep 2025 Issue date: 23 Mar 2021 | 13 Dec 2018 | 23 Mar 2021 |
| Utility: Systems and methods for attack simulation on a production network Filling date: 8 Sep 2025 Issue date: 9 Mar 2021 | 15 Feb 2019 | 9 Mar 2021 |
| Utility: Real-time visual playback with synchronous textual analysis log display and event/time indexing Filling date: 8 Sep 2025 Issue date: 23 Feb 2021 | 9 Jul 2018 | 23 Feb 2021 |
| Utility: Framework for classifying an object as malicious with machine learning for deploying updated predictive models Filling date: 8 Sep 2025 Issue date: 26 Jan 2021 | 29 Jul 2019 | 26 Jan 2021 |
| Utility: Data extraction system for malware analysis Filling date: 8 Sep 2025 Issue date: 26 Jan 2021 | 19 Jun 2017 | 26 Jan 2021 |
| Utility: Detection of phishing attacks using similarity analysis Filling date: 8 Sep 2025 Issue date: 26 Jan 2021 | 24 Mar 2017 | 26 Jan 2021 |
| Utility: Ransomware file modification prevention technique Filling date: 8 Sep 2025 Issue date: 12 Jan 2021 | 29 Jun 2018 | 12 Jan 2021 |
| Utility: Verification and enhancement using detection systems located at the network periphery and endpoint devices Filling date: 8 Sep 2025 Issue date: 12 Jan 2021 | 29 Mar 2017 | 12 Jan 2021 |
| Utility: System and method for detecting interpreter-based exploit attacks Filling date: 8 Sep 2025 Issue date: 5 Jan 2021 | 23 Jul 2018 | 5 Jan 2021 |
| Utility: System and method for triggering analysis of an object for malware in response to modification of that object Filling date: 8 Sep 2025 Issue date: 22 Dec 2020 | 16 Nov 2018 | 22 Dec 2020 |
| Utility: Cyber attack early warning system Filling date: 8 Sep 2025 Issue date: 22 Dec 2020 | 17 Nov 2017 | 22 Dec 2020 |
| Utility: Systems and methods for generation of signature generation using interactive infection visualizations Filling date: 8 Sep 2025 Issue date: 15 Dec 2020 | 16 Jul 2018 | 15 Dec 2020 |
| Utility: Post-intrusion detection of cyber-attacks during lateral movement within networks Filling date: 8 Sep 2025 Issue date: 1 Dec 2020 | 29 Jun 2018 | 1 Dec 2020 |
| Utility: Malicious content analysis using simulated user interaction without user involvement Filling date: 8 Sep 2025 Issue date: 24 Nov 2020 | 5 Mar 2018 | 24 Nov 2020 |