Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 1 | CVE Explained: Breaking Down the Windows KDC Proxy Vulnerability (CVE-2024–43639) | ||
Details | Website | 2024-11-17 | 30 | Cyber Threats to E-Voting | ||
Details | Website | 2024-11-17 | 0 | Vulnerability 101: Understanding CVEs and CVSS Scores | ||
Details | Website | 2024-11-17 | 0 | The DANGER of Weak Passwords: Are You Really Safe? 🔐 | ||
Details | Website | 2024-11-17 | 1 | Is Nordvpn Safe To Install? — Comprehensive Guide And FAQs | ||
Details | Website | 2024-11-17 | 1 | Protect RESTful APIs from SQL Injection: A Guide with Examples | ||
Details | Website | 2024-11-17 | 4 | The Evolution of Cybersecurity: From Firewalls to AI-Based Protection: How cybersecurity has… | ||
Details | Website | 2024-11-17 | 0 | Cybersecurity Myths Busted: What You Need to Know to Stay Safe | ||
Details | Website | 2024-11-17 | 0 | AI’s Game-Changing Impact on Mobile Security | ||
Details | Website | 2024-11-17 | 0 | Title: The Role of IT Compliance in Modern Organizations: Frameworks, Challenges, and Best… | ||
Details | Website | 2024-11-17 | 0 | Getting Started with Cybersecurity. | ||
Details | Website | 2024-11-17 | 0 | Defining Cryptography In Cyber Security | ||
Details | Website | 2024-11-17 | 0 | Is Your API a Backdoor for Hackers? Find Out Now | ||
Details | Website | 2024-11-17 | 0 | Debunking Cybersecurity Myths | ||
Details | Website | 2024-11-17 | 0 | SQL Injection vs. Cross-Site Scripting (XSS): Know the Difference! | ||
Details | Website | 2024-11-17 | 1 | The Road to CRTP Cert — Part 2 | ||
Details | Website | 2024-11-17 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-17 | 0 | The Surprising Way Azure Key Vault Keeps Hackers Out | ||
Details | Website | 2024-11-17 | 0 | Which Foreign Country is Cheapest to Travel? Top Budget Destinations! | ||
Details | Website | 2024-11-17 | 0 | Which Country is the Cheapest to Book Flights From? Discover Savings! | ||
Details | Website | 2024-11-17 | 0 | Is It Illegal to Use a VPN on a Plane? Unveil the Truth | ||
Details | Website | 2024-11-17 | 0 | Do Flight Prices Ever Go Down Day Of? Uncover Secrets! | ||
Details | Website | 2024-11-17 | 0 | How Far in Advance Should I Book a Flight to Europe?: Smart Timing Tips | ||
Details | Website | 2024-11-17 | 0 | Do Flights Get Cheaper Closer to Date? Myths Unveiled | ||
Details | Website | 2024-11-17 | 0 | What is the Cheapest Day to Book International Flights?: Insider Tips! |