Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2754-08-03 | 37 | Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library | ||
Details | Website | 2574-01-02 | 0 | Editors Picks, Apps We Recommend | TechSpot | ||
Details | Website | 2090-01-13 | 50 | “苦象”组织上半年针对我国的攻击活动分析 | ||
Details | Website | 2083-02-01 | 4 | 守夜人之剑 - 攻防演练漏洞必修清单2023 | ||
Details | Website | 2070-01-03 | 13 | 越狱 Llama-3.1-8B-Instruct | CTF导航 | ||
Details | Website | 2051-02-02 | 32 | UNKNOWN | ||
Details | Website | 2051-02-02 | 32 | UNKNOWN | ||
Details | Website | 2050-08-03 | 29 | Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload - CXSecurity.com | ||
Details | Website | 2049-01-13 | 27 | 腾讯安全威胁情报中心推出2023年7月必修安全漏洞清单 | ||
Details | Website | 2031-03-19 | 15 | HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support | ||
Details | Website | 2029-03-27 | 1 | AWS Introduces Global Condition Context Keys to Improve EC2 Security | ||
Details | Website | 2028-10-24 | 0 | MIT Technology Review Insights Survey on Zero Trust in Cybersecurity | ||
Details | Website | 2028-01-01 | 3 | A Tour of the Worm | ||
Details | Website | 2025-11-07 | 1 | Vault7 - Home | ||
Details | Website | 2025-01-01 | 11 | Visionaries Have Democratised Remote Network Access – Citrix Virtual Apps and Desktops (CVE Unknown) | CTF导航 | ||
Details | Website | 2024-12-30 | 27 | Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware | ||
Details | Website | 2024-12-29 | 2 | Cobalt Strike DFIR: Listening to the Pipes — Blake's R&D | ||
Details | Website | 2024-12-28 | 0 | BRICKED SSD ON LIFE SUPPORT — FMADIO | ||
Details | Website | 2024-12-13 | 17 | Rhysida Ransomware analysis - A painful sting to Insomniac Games — ShadowStackRE | ||
Details | Website | 2024-12-12 | 21 | SECCON2016取证题WriteUP - lightless blog | ||
Details | Website | 2024-12-09 | 0 | — | ||
Details | Website | 2024-12-06 | 0 | Can TSA search your phone? Know your digital rights at the airport | ||
Details | Website | 2024-12-06 | 8 | Qilin Ransomware malware analysis — ShadowStackRE | ||
Details | Website | 2024-12-03 | 120 | Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence | ||
Details | Website | 2024-12-03 | 48 | Privacy tools (not) for you — Silent Push Threat Intelligence |