212 patents
Page 4 of 11
Utility
Systems and Methods to Identify a Simulated Phishing Message
6 Oct 22
Systems and methods are described for detecting a simulated phishing message by an email client plug-in.
Greg Kras
Filed: 25 Mar 22
Utility
Systems and Methods for Communication with a Third-party Email Client Plug-in
6 Oct 22
Systems and methods are described for communication of a third-party application server with a third-party email client plug-in.
Greg Kras
Filed: 20 Jun 22
Utility
Time based triggering of dynamic templates
27 Sep 22
Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user.
Greg Kras
Filed: 8 Jun 20
Utility
System and methods for reverse vishing and point of failure remedial training
27 Sep 22
Embodiments of the disclosure describe a simulated phishing campaign manager that communicates a simulated phishing communication that includes at least the telephone number and reference identifier, to a device of a user.
Greg Kras, Alin Irimie
Filed: 3 Jun 20
Utility
Using Smart Groups for Computer-based Security Awareness Training Systems
15 Sep 22
This disclosure describes embodiments of an improvement to the static group solution because all the administrator needs to do is specify the criteria they care about.
Greg Kras, Alin Irimie
Filed: 27 May 22
Utility
System and Methods for Minimizing Organization Risk from Users Associated with a Password Breach
15 Sep 22
System and methods are disclosed for organizations to run a test against an active directory list to see if any user-provided passwords have been part of an existing data breach.
Greg Kras
Filed: 1 Jun 22
Utility
Systems and Methods for Aida Campaign Controller Intelligent Records
1 Sep 22
Systems and methods, disclosed herein, of a campaign controller that stores information to a database about execution of multiple simulated phishing campaigns for multiple users, where each of the simulated phishing campaigns use one or more models for communicating simulated phishing communications.
Stu Sjouwerman, Eric Sites
Filed: 16 May 22
Utility
Systems and Methods for End-user Security Awareness Training for Calendar-based Threats
1 Sep 22
Systems and methods are described for providing calendar-based simulated phishing attacks to users of an organization.
Perry Carpenter, Kathy Wattman, Morgan Flake, Detlev Weise, John Just, Kevin Mitnick
Filed: 16 May 22
Utility
Systems and Methods of Simulated Phishing Campaign Contextualization
1 Sep 22
Systems and methods are described for contextualizing a simulated phishing communication based at least on one of language and locale.
Greg Kras, Katie Brennan
Filed: 18 May 22
Utility
Systems and methods for an artificial intelligence driven agent
30 Aug 22
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 26 Jul 21
Utility
Systems and methods for simulated phishing attacks involving message threads
16 Aug 22
Systems and methods are disclosed for simulating a phishing attack involving an email thread.
Greg Kras
Filed: 11 Aug 21
Utility
Systems and Methods for Using Attribute Data for System Protection and Security Awareness Training
21 Jul 22
The present disclosure describes a system for saving metadata on files and using attribute data files inside a computing system to enhance the ability to provide user interfaces based on actions associated with non-executable attachments like text and document files from untrusted emails, to block execution of potentially harmful executable object downloads and files based on geographic location, and to a create a prompt for users to decide whether to continue execution of potentially harmful executable object downloads and files.
Bret Lowry, Gauvin Repuspolo
Filed: 4 Apr 22
Utility
Systems and Methods for Determining a Job Score from a Job Title
14 Jul 22
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a job score for a user based on the user's job title.
Eric Wayne Sites, Ryan Scott Davis, Daniel James DeCola
Filed: 4 Apr 22
Utility
System and Methods for Spoofed Domain Identification and User Training
14 Jul 22
Systems and methods are disclosed that minimize ongoing risk to an organization from user behaviors which magnify the severity of a spoofed domain.
Stu Sjouwerman, Alin Irimie, Greg Kras
Filed: 1 Apr 22
Utility
Systems and methods for communication with a third-party email client plug-in
5 Jul 22
Systems and methods are described for communication of a third-party application server with a third-party email client plug-in.
Greg Kras
Filed: 5 Feb 21
Utility
Systems and Methods for Determination of Level of Security to Apply to a Group Before Display of User Data
30 Jun 22
Systems and methods are described for using secured groups for simulated phishing campaigns to obfuscate data for levels of privacy based on protected criteria classes.
Greg Kras, Chris Cline
Filed: 17 Mar 22
Utility
Systems and Methods for Situational Localization of Aida
30 Jun 22
The present disclosure describes systems and methods for using for a simulated phishing campaign, information about one or more situations of a user determined from an electronic calendar of the user, A campaign controller may identify/ an electronic calendar of a user for which to direct a simulated phishing campaign, determine one or more situations of the user from information stored in the electronic calendar and select either a template from a plurality of templates or a starting action from a plurality of starting actions for the simulated phishing campaign based at least on the one or more situations of the user.
Greg Kras
Filed: 16 Mar 22
Utility
Systems and Methods for Determining Individual and Group Risk Scores
23 Jun 22
Emboiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 7 Mar 22
Utility
Systems and Methods for Improving Assessment of Security Risk Based on Personal Internet Account Data
16 Jun 22
Systems and methods are described for improving assessment of security risk based on a user's personal information.
Greg Kras
Filed: 9 Dec 21
Utility
Systems and Methods for Providing Configurable Responses to Threat Identification
9 Jun 22
Systems and methods are described for providing customized message content to be displayed to a user of an email client, responsive to the user selecting, via a plug-in or agent of the email client, to report an email as a potential phishing email.
Greg Kras, Adam Alessandrini
Filed: 24 Feb 22