212 patents
Page 7 of 11
Utility
Systems and methods for use of address fields in a simulated phishing attack
31 Aug 21
Systems and methods are disclosed for creating simulated phishing attack messages that have characteristics which make them appear genuine, while also having characteristics that a user should recognize as being false.
Jasmine Rodriguez, Daniel Cormier
Filed: 28 Apr 20
Utility
System and methods for efficient combining of malware detection rules
31 Aug 21
System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
Filed: 11 Aug 20
Utility
Systems and methods for determining individual and group risk scores
31 Aug 21
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 14 Dec 20
Utility
Systems and methods for simulated phishing attacks involving message threads
31 Aug 21
Systems and methods are disclosed for simulating a phishing attack involving an email thread.
Greg Kras
Filed: 14 Aug 20
Utility
Systems and Methods for Communication with a Third-party Email Client Plug-in
12 Aug 21
Systems and methods are described for communication of a third-party application server with a third-party email client plug-in.
Greg Kras
Filed: 5 Feb 21
Utility
Systems and Methods for Providing Configurable Responses to Threat Identification
12 Aug 21
Systems and methods are described for providing customized message content to be displayed to a user of an email client, responsive to the user selecting, via a plug-in or agent of the email client, to report an email as a potential phishing email.
Greg Kras, Adam Alessandrini
Filed: 5 Feb 21
Utility
Systems and Methods for Performing or Creating Simulated Phishing Attacks and Phishing Attack Campaigns
5 Aug 21
A method for establishing a campaign for a simulated phishing attack includes receiving, via a campaign manager, specification of a plurality of parameters for a campaign including at least an identifier of a campaign and identification of users to which to send the campaign, establishing, via the campaign manager, a type of exploit for the campaign and one or more types of data to collect via the type of exploit, storing, by the campaign manager, the campaign comprising the plurality of parameters, and identifying, by a simulation server, the campaign stored in the database to create a simulated phishing email, to be sent to email accounts of the users, using the plurality of parameters of the campaign, wherein the simulated phishing email is to be created to have a link to a landing page comprising the type of exploit and configured to collect the one or more types of data.
Alin Irimie, Wendy Bartlett, David Austin
Filed: 30 Nov 20
Utility
Systems and Methods for Aida Based A/b Testing
29 Jul 21
Systems and methods are described by which a serving module of a campaign controller identifies a first version of a model which the campaign controller uses to communicate a first simulated phishing communication to a plurality of users.
Eric Sites
Filed: 15 Apr 21
Utility
Systems and methods for an artificial intelligence driven agent
27 Jul 21
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 30 Nov 20
Utility
System and Methods of Cybersecurity Attack Simulation for Incident Response Training and Awareness
22 Jul 21
Systems and methods are disclosed that are useful for minimizing organization risk in the case of a cybersecurity attack, through computer-based simulation of cybersecurity attacks, incident response tracking and incident response training provided responsive to the simulation outcome.
Greg Kras, Alin Irimie
Filed: 8 Apr 21
Utility
Systems and methods for performing simulated phishing attacks using social engineering indicators
20 Jul 21
Systems and methods are provided for performing simulated phishing attacks using social engineering indicators.
Alin Irimie, Greg Kras, David Austin, Benjamin Dalton
Filed: 23 Jan 20
Utility
Systems and methods for AIDA campaign controller intelligent records
29 Jun 21
Systems and methods, disclosed herein, of a campaign controller that stores information to a database about execution of multiple simulated phishing campaigns for multiple users, where each of the simulated phishing campaigns use one or more models for communicating simulated phishing communications.
Stu Sjouwerman, Eric Sites
Filed: 16 Nov 20
Utility
Systems and Methods for an Artificial Intelligence Driven Smart Template
17 Jun 21
The present disclosure describes systems and methods for determining a subsequent action of a simulated phishing campaign.
Stu Sjouwerman
Filed: 22 Dec 20
Utility
System and methods for minimizing organization risk from users associated with a password breach
15 Jun 21
System and methods are disclosed for organizations to run a test against an active directory list to see if any user-provided passwords have been part of an existing data breach.
Greg Kras
Filed: 17 Jan 20
Utility
Systems and methods for effective delivery of simulated phishing campaigns
15 Jun 21
Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users.
Mark William Patton, Daniel Cormier, Greg Kras
Filed: 15 Feb 21
Utility
Systems and Methods for Aida Based Second Chance
27 May 21
Methods and systems are described in which a system provides a user interface to confirm whether to review or take an action associated with an untrusted email.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 8 Feb 21
Utility
Systems and Methods for Artificial Intelligence Driven Agent Campaign Controller
20 May 21
The present disclose describes systems and methods for creating a simulated phishing campaign for a user based on at least a history of the user with respect to simulated phishing campaigns.
Eric Sites
Filed: 26 Jan 21
Utility
Systems and Methods for Determining Individual and Group Risk Scores
6 May 21
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 14 Dec 20
Utility
Systems and Methods for Aida Based Grouping
6 May 21
The present disclosure describes systems and methods for dynamically creating groups of users based on attributes for simulated phishing campaign.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 11 Jan 21
Utility
Systems and Methods for Artificial Model Building Techniques
6 May 21
Embodiments disclosed describe a security awareness system may adaptively learn the best design of a simulated phishing campaign to get a user to perform the requested actions, such as clicking a hyperlink or opening a file.
Eric Sites
Filed: 13 Jan 21