Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2024-11-30 5 Reverse Engineering Firefox and Tor Targeted Payloads — Leviathan Security Group
Details Website 2024-11-30 4 Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade
Details Website 2024-11-26 33 LostTrust Ransomware - Trust nothing — ShadowStackRE
Details Website 2024-11-22 6 Black Friday e-commerce scam: Comprehensive analysis of PayPal attack vectors. — Silent Push Threat Intelligence
Details Website 2024-11-18 0 An update on political advertising in the European Union
Details Website 2024-11-17 0 Impact of Organizational and Team Dynamics on Threat Hunting as an ISSMP
Details Website 2024-11-17 0 Beyond Passwords : How Blockchain is Transforming Identity and Authentication Systems.
Details Website 2024-11-17 4 TryHackMe | Active Reconnaissance WriteUp
Details Website 2024-11-17 0 Encryption vs. Evidence: A Global Balancing Act with New Security Features Raising Concerns
Details Website 2024-11-17 0 Phishing emails increasingly use SVG attachments to evade detection
Details Website 2024-11-17 3 4T$-CTF Writeup — “Stirling”
Details Website 2024-11-17 0 How Organizations Are Fulfilling CISA’s Secure by Design Pledge
Details Website 2024-11-17 5 Building a Powerful Packet Sniffing Tool with Python
Details Website 2024-11-17 0 OWASP Top 10–2021 Tryhackme Writeup
Details Website 2024-11-17 0 AI Model Robustness: A New Frontier in Cybersecurity
Details Website 2024-11-17 0 Artificial Intelligence and Security: A Predestined Partnership
Details Website 2024-11-17 14 Handcrafting x64 ELF — From Specification to Bytes
Details Website 2024-11-17 0 In AI era , cybersecurity management will remain human-centric
Details Website 2024-11-17 15 CTF Write-up: Sigma 101 (Certified Cyber Defenders)
Details Website 2024-11-17 0 "Navigating the future of digital security: How evolving threats, advanced AI, and new protection…
Details Website 2024-11-17 8 “Embarking on API Security Testing: A Beginner’s Guide to Understanding APIs and Utilizing Postman”…
Details Website 2024-11-17 13 Intigriti 1337Up Live 2024-CTF: Web Challenges
Details Website 2024-11-17 0 Cybersecurity in Autonomous Vehicles: Safeguarding the Future of Mobility
Details Website 2024-11-17 3 “Embarking on API Security Testing: A Beginner’s Guide to Understanding APIs and Utilizing Postman”…
Details Website 2024-11-17 1 [BLACKSUIT] - Ransomware Victim: hetrhedens[.]nl - RedPacket Security