白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Message platform for automated threat simulation, reporting, detection, and remediation

專利號
US11997115B1
公開日期
2024-05-28
申請人
Cofense Inc.(US VA Leesburg)
發(fā)明人
Aaron Higbee; David Chamberlain; Vineetha Philip
IPC分類
H04L9/40; G06F16/35; G06F21/00; G06F21/55; H04L51/212; H04L51/08
技術(shù)領(lǐng)域
message,phishing,email,messages,be,or,emails,in,user,cluster
地域: VA VA Leesburg

摘要

Methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.

說明書

As illustrated in flow 700 of FIG. 19, the system may also respond to messages other than simulated phishing attack messages. As in FIG. 18, the system may receive a message identified as a potential phishing attack in stage 704 (step S1) and proceed to stage 706 (step S2), where the message is decoded and/or decrypted. Unlike FIG. 18, after stage 706 (step S2), the flow 700 may proceed to stage 720, where the message is determined to be a simulated or known phishing attack. If the message is not a known phishing attack or simulated phishing attack message, the system treats the message as non-simulated suspicious message and processes accordingly by, e.g., forwarding it to a pre-configured address and proceeds to stage 730. Additionally, if the header data relating to an expiration time (expr=hh:mm:ss:UTC) has expired, then the message may also be treated as suspicious, continuing to stage 730. In those embodiments, as a non-limiting example, some of or all of the reported message may be forwarded to an address accessible in a mail server by any appropriate protocol, such as, but not limited to, Internet Message Access Protocol (IMAP), Post Office Protocol (POP), ActiveSync?, or Exchange? The reported message address may be at an intermediate message store configured for collecting the reported messages. In stage 730, if the system determines that the message is not from a non-phishing or trusted source flow 700 proceeds to stage 740, otherwise flow 700 proceeds to stage 712. In a stage 740, the message and associated metadata are further analyzed to determine if the message is a phishing attack message.

權(quán)利要求

1
微信群二維碼
意見反饋