Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 2 | Malware and Cache | ||
Details | Website | 2024-11-17 | 1 | Affordable VPN Low Prices | ||
Details | Website | 2024-11-17 | 6 | Automating Security with Wazuh Active Response | ||
Details | Website | 2024-11-17 | 1 | [CHORT] - Ransomware Victim: texanscan[.]org - RedPacket Security | ||
Details | Website | 2024-11-17 | 1 | [CHORT] - Ransomware Victim: hartwick[.]edu - RedPacket Security | ||
Details | Website | 2024-11-17 | 1 | [CHORT] - Ransomware Victim: edwardsburgschoolsfoundation[.]org - RedPacket Security | ||
Details | Website | 2024-11-17 | 1 | [CHORT] - Ransomware Victim: Tri-TechElectronics[.]com - RedPacket Security | ||
Details | Website | 2024-11-17 | 1 | [CHORT] - Ransomware Victim: bartow[.]k12[.]ga[.]us - RedPacket Security | ||
Details | Website | 2024-11-17 | 0 | [KILLSEC] - Ransomware Victim: Dragon Capital - RedPacket Security | ||
Details | Website | 2024-11-17 | 1 | [CHORT] - Ransomware Victim: paaf[.]gov[.]kw - RedPacket Security | ||
Details | Website | 2024-11-17 | 0 | [MONEYMESSAGE] - Ransomware Victim: The Egyptian Tax Authority (ETA) - RedPacket Security | ||
Details | Website | 2024-11-17 | 0 | Embracing cybersecurity in pop culture from fiction to reality - London Business News | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 16 | InfoSecPrep : VulnHub Machines | ||
Details | Website | 2024-11-17 | 0 | Negotiate with Hackers? Buchanan Ingersoll & Rooney Discuss | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 0 | AWS Security Essentials: Protecting Your Cloud Infrastructure | ||
Details | Website | 2024-11-17 | 0 | Bank fraud is rampant. Your data could be anywhere. Here’s how to protect yourself. | ||
Details | Website | 2024-11-17 | 0 | Global Cybersecurity Threats and the Race for Digital Sovereignty | ||
Details | Website | 2024-11-17 | 0 | Data Privacy and Security: Legal Obligations for E-commerce Businesses | ||
Details | Website | 2024-11-17 | 0 | The Security illusion: Why Two-Factor Authentication is No Longer Enough | ||
Details | Website | 2024-11-17 | 0 | Ontology and Taxonomy in Cybersecurity | ||
Details | Website | 2024-11-17 | 2 | CVE Alert: CVE-2024-52410 - RedPacket Security | ||
Details | Website | 2024-11-17 | 1 | CVE Alert: CVE-2024-52409 - RedPacket Security | ||
Details | Website | 2024-11-17 | 0 | From Forest Trails to Digital Investigations: My Journey with TraceLabs | ||
Details | Website | 2024-11-17 | 0 | [CyberSec Pills] Elevating Cybersecurity with Jupyter Notebook | ||
Details | Website | 2024-11-17 | 0 | Algorithm:- |