Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2008-11-19 | 0 | Under Worm Assault, Military Bans Disks, USB Drives | ||
Details | Website | 2008-11-18 | 3 | New rule groups and new rules for SCADA | ||
Details | Website | 2008-11-17 | 0 | McColo - Who Was Behind It? | ||
Details | Website | 2008-11-14 | 0 | Toward the Commoditization of Natural Language Processing | ||
Details | Website | 2008-11-14 | 0 | Maltego Download - Data Mining & Information Gathering Tool - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2008-11-13 | 7 | One Tricky Banking Trojan | ||
Details | Website | 2008-11-13 | 1 | Express Scripts Offers $1million Reward for Cyber Extortionists - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2008-11-11 | 0 | WPA Wi-Fi Encryption Scheme Partially Cracked - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2008-11-11 | 7 | Microsoft Reveals Malware and Spam Trends | ||
Details | Website | 2008-11-06 | 26 | Yesterday's Obama Spammer Now Imitates Colonial Bank | ||
Details | Website | 2008-11-06 | 0 | | HT - Hackers Thirst | ||
Details | Website | 2008-10-28 | 26 | Update on Snort and ClamAV for ms08-067 | ||
Details | Website | 2008-10-20 | 4 | Introduction to Network Penetration Testing | ||
Details | Website | 2008-10-19 | 21 | Using OSPF on Juniper Netscreen Firewalls | Corelan Cybersecurity Research | ||
Details | Website | 2008-10-17 | 0 | Liberal Democrat leader visits our lab | Light Blue Touchpaper | ||
Details | Website | 2008-10-16 | 0 | Virus Bulletin :: Researchers urge anti-phishing companies to share data | ||
Details | Website | 2008-10-12 | 17 | Metasploit WMAP Web Attack and Exploitation | ||
Details | Website | 2008-10-02 | 3 | Perl Snippet | ||
Details | Website | 2008-09-29 | 1 | Doubling Up | ||
Details | Website | 2008-09-23 | 32 | Digital Certificate Spammer Goes for Google Adwords | ||
Details | Website | 2008-09-13 | 7 | Internet Landfills: Praise for Brian Krebs | ||
Details | Website | 2008-09-11 | 0 | Using SMB Packet Signing | ||
Details | Website | 2008-09-05 | 4 | Webcast Teaser -- Basic Buffer Overflow Detection | ||
Details | Website | 2008-09-01 | 0 | LANMAN and NTLM: Not as complex as you think! | ||
Details | Website | 2008-08-30 | 5 | Implementing an LSA proxy authentication package |