Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2024-11-17 2 Malware and Cache
Details Website 2024-11-17 1 Affordable VPN Low Prices
Details Website 2024-11-17 6 Automating Security with Wazuh Active Response
Details Website 2024-11-17 1 [CHORT] - Ransomware Victim: texanscan[.]org - RedPacket Security
Details Website 2024-11-17 1 [CHORT] - Ransomware Victim: hartwick[.]edu - RedPacket Security
Details Website 2024-11-17 1 [CHORT] - Ransomware Victim: edwardsburgschoolsfoundation[.]org - RedPacket Security
Details Website 2024-11-17 1 [CHORT] - Ransomware Victim: Tri-TechElectronics[.]com - RedPacket Security
Details Website 2024-11-17 1 [CHORT] - Ransomware Victim: bartow[.]k12[.]ga[.]us - RedPacket Security
Details Website 2024-11-17 0 [KILLSEC] - Ransomware Victim: Dragon Capital - RedPacket Security
Details Website 2024-11-17 1 [CHORT] - Ransomware Victim: paaf[.]gov[.]kw - RedPacket Security
Details Website 2024-11-17 0 [MONEYMESSAGE] - Ransomware Victim: The Egyptian Tax Authority (ETA) - RedPacket Security
Details Website 2024-11-17 0 Embracing cybersecurity in pop culture from fiction to reality - London Business News | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-17 16 InfoSecPrep : VulnHub Machines
Details Website 2024-11-17 0 Negotiate with Hackers? Buchanan Ingersoll & Rooney Discuss | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-17 0 AWS Security Essentials: Protecting Your Cloud Infrastructure
Details Website 2024-11-17 0 Bank fraud is rampant. Your data could be anywhere. Here’s how to protect yourself.
Details Website 2024-11-17 0 Global Cybersecurity Threats and the Race for Digital Sovereignty
Details Website 2024-11-17 0 Data Privacy and Security: Legal Obligations for E-commerce Businesses
Details Website 2024-11-17 0 The Security illusion: Why Two-Factor Authentication is No Longer Enough
Details Website 2024-11-17 0 Ontology and Taxonomy in Cybersecurity
Details Website 2024-11-17 2 CVE Alert: CVE-2024-52410 - RedPacket Security
Details Website 2024-11-17 1 CVE Alert: CVE-2024-52409 - RedPacket Security
Details Website 2024-11-17 0 From Forest Trails to Digital Investigations: My Journey with TraceLabs
Details Website 2024-11-17 0 [CyberSec Pills] Elevating Cybersecurity with Jupyter Notebook
Details Website 2024-11-17 0 Algorithm:-