Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2008-11-19 0 Under Worm Assault, Military Bans Disks, USB Drives
Details Website 2008-11-18 3 New rule groups and new rules for SCADA
Details Website 2008-11-17 0 McColo - Who Was Behind It?
Details Website 2008-11-14 0 Toward the Commoditization of Natural Language Processing
Details Website 2008-11-14 0 Maltego Download - Data Mining & Information Gathering Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2008-11-13 7 One Tricky Banking Trojan
Details Website 2008-11-13 1 Express Scripts Offers $1million Reward for Cyber Extortionists - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2008-11-11 0 WPA Wi-Fi Encryption Scheme Partially Cracked - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2008-11-11 7 Microsoft Reveals Malware and Spam Trends
Details Website 2008-11-06 26 Yesterday's Obama Spammer Now Imitates Colonial Bank
Details Website 2008-11-06 0 | HT - Hackers Thirst
Details Website 2008-10-28 26 Update on Snort and ClamAV for ms08-067
Details Website 2008-10-20 4 Introduction to Network Penetration Testing
Details Website 2008-10-19 21 Using OSPF on Juniper Netscreen Firewalls | Corelan Cybersecurity Research
Details Website 2008-10-17 0 Liberal Democrat leader visits our lab | Light Blue Touchpaper
Details Website 2008-10-16 0 Virus Bulletin :: Researchers urge anti-phishing companies to share data
Details Website 2008-10-12 17 Metasploit WMAP Web Attack and Exploitation
Details Website 2008-10-02 3 Perl Snippet
Details Website 2008-09-29 1 Doubling Up
Details Website 2008-09-23 32 Digital Certificate Spammer Goes for Google Adwords
Details Website 2008-09-13 7 Internet Landfills: Praise for Brian Krebs
Details Website 2008-09-11 0 Using SMB Packet Signing
Details Website 2008-09-05 4 Webcast Teaser -- Basic Buffer Overflow Detection
Details Website 2008-09-01 0 LANMAN and NTLM: Not as complex as you think!
Details Website 2008-08-30 5 Implementing an LSA proxy authentication package