Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2009-03-12 | 1 | Malware for Incident Responders - Examples | ||
Details | Website | 2009-03-10 | 3 | Behold the Glory of Mattland | ||
Details | Website | 2009-03-09 | 8 | Supplemental Data for Calculating Mozilla Patching Speed - Microsoft Security Blog | ||
Details | Website | 2009-03-06 | 5 | Generating Virus Signatures - The Automated Way | ||
Details | Website | 2009-03-06 | 0 | fzem - MUA (Mail User Agent) / Mail Client Fuzzer - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2009-02-26 | 27 | Another Password Stealer hides as Bank of America video malware | ||
Details | Website | 2009-02-25 | 6 | Astaro Command Center 2.0 BETA Begins | ||
Details | Website | 2009-02-24 | 3 | Detecting Silly Javascript Obfuscation Techniques | ||
Details | Website | 2009-02-24 | 0 | Configuring Wireless settings via Group Policy | ||
Details | Website | 2009-02-22 | 1 | Homebrew patch for Adobe AcroReader 9 | ||
Details | Website | 2009-02-21 | 2 | Looking for "Bad Stuff", part I | ||
Details | Website | 2009-02-20 | 0 | one malloc to rule them all | ||
Details | Website | 2009-02-20 | 0 | DShield Web Honeypot Project - Alpha Version Released - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2009-02-19 | 35 | Leetness Not Actually Required For Pwnage | ||
Details | Website | 2009-02-19 | 1 | Making Conficker Cough Up the Goods | ||
Details | Website | 2009-02-18 | 7 | MS09-002 in the wild | ||
Details | Website | 2009-02-11 | 0 | Webtunnel 0.0.2 - HTTP Encapsulation and Tunnel Tool - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2009-02-10 | 0 | Disabling Bluetooth and Infrared Beaming | ||
Details | Website | 2009-01-30 | 0 | IDA v5.4 supports Windbg as a debugger backend | ||
Details | Website | 2009-01-30 | 0 | Dial up security woes from East Africa | ||
Details | Website | 2009-01-29 | 39 | [Emerging-Sigs] Gozi/Ordergun/Orderjack sig mod + new | ||
Details | Website | 2009-01-22 | 6 | Windows 7 Beta | ||
Details | Website | 2009-01-15 | 0 | Next-Gen Botnets Taking The Place of Storm and Srizbi - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2009-01-13 | 0 | Fake CNN Site From Phishing E-mail Serves Trojan - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2009-01-12 | 0 | OWASP (Open Web Application Security Project) Testing Guide v3 Released - Darknet - Hacking Tools, Hacker News & Cyber Security |