US 12,255,919 B1
Integrated security for cloud applications
Atif Mushtaq, San Ramon, CA (US)
Assigned to SlashNext, Inc., Pleasanton, CA (US)
Filed by SlashNext, Inc., Pleasanton, CA (US)
Filed on Aug. 30, 2024, as Appl. No. 18/820,347.
Claims priority of provisional application 63/580,465, filed on Sep. 5, 2023.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1483 (2013.01) 26 Claims
OG exemplary drawing
 
1. A method for phishing detection for emails, the method comprising:
(a) processing an original message to determine whether the original message is suspicious;
(b) upon determining the original message is suspicious, generating multiple copies of the original message for detecting a phishing attack, wherein the multiple copies are varied from the original message in least one of lengths, tones, formats, and writing styles such that the multiple copies are generated to be similar to a training dataset that is utilized to train a phishing attack detection engine;
(c) processing the multiple copies and the original message by the phishing attack detection engine to detect an attack; and
(d) upon detecting the phishing attack, alerting a user about the phishing attack, filtering or blocking the original message.