US 12,079,328 B1
Techniques for inspecting running virtualizations for cybersecurity risks
Daniel Hershko Shemesh, Givat-Shmuel (IL); Yarin Miran, Rishon Lezion (IL); Roy Reznik, Tel Aviv (IL); Ami Luttwak, Binyamina (IL); Yinon Costica, Tel Aviv (IL); Niv Roit Ben David, Tel Aviv (IL); Yaniv Shaked, Tel Aviv (IL); Raaz Herzberg, Tel Aviv (IL); and Amir Lande Blau, Tel Aviv (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Oct. 10, 2023, as Appl. No. 18/484,055.
Application 18/484,055 is a continuation in part of application No. 17/804,212, filed on May 26, 2022.
Application 18/484,055 is a continuation in part of application No. 17/664,508, filed on May 23, 2022.
Int. Cl. G06F 21/53 (2013.01); G06F 9/455 (2018.01)
CPC G06F 21/53 (2013.01) [G06F 9/45558 (2013.01); G06F 2009/4557 (2013.01); G06F 2009/45587 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method for inspecting a running container for a cybersecurity object in a cloud computing environment, comprising:
generating a clone of a disk, wherein the disk is deployed in a cloud computing environment, wherein the disk comprises a base image;
detecting a first software container identifier of a first software container on the generated cloned disk, wherein the first software container is a running container;
determining a location of a software container repository based on the identifier;
accessing, based at least on the identifier, the software container repository to inspect the cloned disk for a cybersecurity object, wherein the inspection comprises inspecting each layer of a plurality of layers of the first software container;
detecting the cybersecurity object on the cloned disk;
detecting a cybersecurity threat based on the detection of the cybersecurity object;
detecting in the cloud computing environment a second software container deployed based on the base image; and
initiating a mitigation action for the first software container and the second software container, in response to the detection of the cybersecurity threat.