Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2754-08-03 37 Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library
Details Website 2574-01-02 0 Editors Picks, Apps We Recommend | TechSpot
Details Website 2090-01-13 50 “苦象”组织上半年针对我国的攻击活动分析
Details Website 2083-02-01 4 守夜人之剑 - 攻防演练漏洞必修清单2023
Details Website 2070-01-03 13 越狱 Llama-3.1-8B-Instruct | CTF导航
Details Website 2051-02-02 32 UNKNOWN
Details Website 2051-02-02 32 UNKNOWN
Details Website 2050-08-03 29 Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload - CXSecurity.com
Details Website 2049-01-13 27 腾讯安全威胁情报中心推出2023年7月必修安全漏洞清单
Details Website 2037-10-13 14 Abusing IP camera's for red teaming: Obtaining the firmware
Details Website 2031-03-19 15 HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support
Details Website 2029-03-27 1 AWS Introduces Global Condition Context Keys to Improve EC2 Security
Details Website 2028-10-24 0 MIT Technology Review Insights Survey on Zero Trust in Cybersecurity
Details Website 2028-01-01 3 A Tour of the Worm
Details Website 2026-11-24 6 每日安全动态推送(24/11/26) | CTF导航
Details Website 2025-12-17 17 Stories from the SOC: Caught in the Trap: Detecting and…
Details Website 2025-12-14 0 3 Tips for Eliminating Attack Surface Blind Spots
Details Website 2025-12-13 0 Best Practices for Securing Web Applications Against Modern…
Details Website 2025-11-27 0 The Ransomware Threat: Preparing Schools and Libraries for…
Details Website 2025-11-27 0 How Agentic AI Is Transforming Enterprise Software…
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2025-09-04 0 HITRUST Implementation vs. Measured PRISMA Levels: What Is…
Details Website 2025-09-01 0 How ThreatConnect and Polarity Empower Teams to Combat Phishing Threats | ThreatConnect
Details Website 2025-08-06 0 Preparing Evidence for a Validated HITRUST Assessment
Details Website 2025-08-01 0