Common Information
Type | Value |
---|---|
Value |
ML Software |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Most machine learning systems rely on a limited set of machine learning frameworks. An adversary could get access to a large number of machine learning systems through a comprise of one of their supply chains. Many machine learning projects also rely on other open source implementations of various algorithms. These can also be compromised in a targeted way to get access to specific systems. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-08-20 | 5 | From MLOps to MLOops: Exposing the Attack Surface of Machine Learning Platforms | ||
Details | Website | 2023-05-19 | 0 | The role of automation in mitigating cybersecurity risks | ||
Details | Website | 2023-05-09 | 2 | Cybersecurity in the AI Era | ||
Details | Website | 2023-04-25 | 0 | AI-powered chatbots: the threats to national security are only beginning | ||
Details | Website | 2023-04-24 | 1 | Palo Alto Networks automates cybersecurity with machine learning |