| CPC G06F 21/54 (2013.01) [G06F 8/65 (2013.01); G06F 9/546 (2013.01); G06F 21/564 (2013.01); G06F 21/566 (2013.01); G06F 21/577 (2013.01)] | 18 Claims |

|
1. A method for protecting against a cybersecurity attack during a software upgrade, the method comprising:
conducting, by a first analyzer, one or more threat evaluation operations on at least a suspicious object of a first plurality of suspicious objects, the one or more threat evaluation operations are conducted at least based on cybersecurity analytics content data;
generating a second analyzer configured to conduct one or more threat evaluation operations based on at least updated cybersecurity analytics content data that differs, at least in part, from the cybersecurity analytics content data;
responsive to the generating of the second analyzer, assigning a second plurality of suspicious objects to the second analyzer for threat evaluation that would have otherwise been directed to the first analyzer, wherein the second plurality of suspicious objects includes one or more suspicious objects of the first plurality of suspicious objects; and
comparing results from an analysis of the one or more suspicious objects by the first analyzer and results from an analysis of the one or more suspicious objects by the second analyzer operating concurrently with the first analyzer to analyze and troubleshoot the cybersecurity analytics content data and the updated cybersecurity analytics content data before transitioning an analysis of subsequent suspicious objects to be conducted by the second analyzer.
|