Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | — | 0 | Data-driven cyber: empowering government security with focused insights from data | ||
Details | Website | — | 0 | Funded cyber certification helps small charities to provide legal aid to vulnerable citizens | ||
Details | Website | — | 0 | Application Development Guidance: Introduction | ||
Details | Website | — | 1 | InQuest Labs - InQuest.net | ||
Details | Website | — | 1 | Password Managers. | ||
Details | Website | — | 0 | Unauthorized: Cannot Process Request | ||
Details | Website | — | 6 | launchd keywords for plists | ||
Details | Website | — | 11 | Shared Libraries | ||
Details | Website | — | 2 | crontab(5): tables for driving cron - Linux man page | ||
Details | Website | — | 1 | Duplicati | ||
Details | Website | — | 20 | UNKNOWN | ||
Details | Website | — | 0 | Car Hacking: The definitive source | ||
Details | Website | — | 0 | Transparency | ||
Details | Website | — | 0 | — | ||
Details | Website | — | 6 | Exploiting A Tricky SQL Injection With sqlmap | pentestmonkey | ||
Details | Website | — | 0 | Creating a Process (The GNU C Library) | ||
Details | Website | — | 0 | Taking a data-driven approach to cyber security | ||
Details | Website | — | 1 | About Us | ||
Details | Website | — | 2 | BugBountyHunting.com - A community-curated Resource for Bug Bounty Hunting | ||
Details | Website | — | 0 | Industry 100: a project in data driven security | ||
Details | Website | — | 49 | UNKNOWN | ||
Details | Website | — | 6 | UNKNOWN | ||
Details | Website | — | 1 | Man in the Middle (MITM) Attacks | Types, Techniques, and Prevention | ||
Details | Website | — | 4 | 502 - No server or forwarder data received (Privoxy@375f698c0d9e) | ||
Details | Website | — | 1905 | UNKNOWN |