Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-30 | 5 | Reverse Engineering Firefox and Tor Targeted Payloads — Leviathan Security Group | ||
Details | Website | 2024-11-30 | 4 | Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade | ||
Details | Website | 2024-11-26 | 33 | LostTrust Ransomware - Trust nothing — ShadowStackRE | ||
Details | Website | 2024-11-22 | 6 | Black Friday e-commerce scam: Comprehensive analysis of PayPal attack vectors. — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-18 | 0 | An update on political advertising in the European Union | ||
Details | Website | 2024-11-17 | 0 | Impact of Organizational and Team Dynamics on Threat Hunting as an ISSMP | ||
Details | Website | 2024-11-17 | 0 | Beyond Passwords : How Blockchain is Transforming Identity and Authentication Systems. | ||
Details | Website | 2024-11-17 | 4 | TryHackMe | Active Reconnaissance WriteUp | ||
Details | Website | 2024-11-17 | 0 | Encryption vs. Evidence: A Global Balancing Act with New Security Features Raising Concerns | ||
Details | Website | 2024-11-17 | 0 | Phishing emails increasingly use SVG attachments to evade detection | ||
Details | Website | 2024-11-17 | 3 | 4T$-CTF Writeup — “Stirling” | ||
Details | Website | 2024-11-17 | 0 | How Organizations Are Fulfilling CISA’s Secure by Design Pledge | ||
Details | Website | 2024-11-17 | 5 | Building a Powerful Packet Sniffing Tool with Python | ||
Details | Website | 2024-11-17 | 0 | OWASP Top 10–2021 Tryhackme Writeup | ||
Details | Website | 2024-11-17 | 0 | AI Model Robustness: A New Frontier in Cybersecurity | ||
Details | Website | 2024-11-17 | 0 | Artificial Intelligence and Security: A Predestined Partnership | ||
Details | Website | 2024-11-17 | 14 | Handcrafting x64 ELF — From Specification to Bytes | ||
Details | Website | 2024-11-17 | 0 | In AI era , cybersecurity management will remain human-centric | ||
Details | Website | 2024-11-17 | 15 | CTF Write-up: Sigma 101 (Certified Cyber Defenders) | ||
Details | Website | 2024-11-17 | 0 | "Navigating the future of digital security: How evolving threats, advanced AI, and new protection… | ||
Details | Website | 2024-11-17 | 8 | “Embarking on API Security Testing: A Beginner’s Guide to Understanding APIs and Utilizing Postman”… | ||
Details | Website | 2024-11-17 | 13 | Intigriti 1337Up Live 2024-CTF: Web Challenges | ||
Details | Website | 2024-11-17 | 0 | Cybersecurity in Autonomous Vehicles: Safeguarding the Future of Mobility | ||
Details | Website | 2024-11-17 | 3 | “Embarking on API Security Testing: A Beginner’s Guide to Understanding APIs and Utilizing Postman”… | ||
Details | Website | 2024-11-17 | 1 | [BLACKSUIT] - Ransomware Victim: hetrhedens[.]nl - RedPacket Security |