Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2024-11-17 0 What Country Has the Lowest Prices? Uncover Global Bargains!
Details Website 2024-11-17 0 Which Country is Best for VPN? Top Picks Unveiled!
Details Website 2024-11-17 0 Where is the Cheapest International Place to Fly To?: Uncover Savings!
Details Website 2024-11-17 0 Can Using a VPN Get Cheaper Flights? Unlock Savings!
Details Website 2024-11-17 0 Which Country VPN is Cheapest for Flights? Uncover Savings!
Details Website 2024-11-17 0 Is Surfshark Legal to Use? Unveil the Truth Today!
Details Website 2024-11-17 0 Does Surfshark Track You? Unveiling the Truth!
Details Website 2024-11-17 0 Susquehanna Raises Target to $90 Amid Strong Q3 Performance and AI-Driven Cybersecurity Growth | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-17 1 CVE Alert: CVE-2024-52414 - RedPacket Security
Details Website 2024-11-17 0 Black Friday and Cyber Monday: A Hotspot for Cyber Crime | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-17 2 2024 Cloud Security Report -Checkpoint - Cybersecurity Insiders
Details Website 2024-11-17 1 Solid Security Pro Review
Details Website 2024-11-17 0 🚨 Vietnamese Hackers Unleash PXA Stealer: Targeting Sensitive Data Across Europe and Asia 🌍🔓
Details Website 2024-11-17 1 🚨 DEEPDATA Malware Exploits Fortinet Flaw to Steal VPN Credentials 🔒
Details Website 2024-11-17 3 Top 10 Daily Cybercrime Brief by FCRF [17.11.2024]: Click here to Know More | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-17 4 HTB Password Attacks Lab Medium
Details Website 2024-11-17 1 NordVPN’s Black Friday deal review
Details Website 2024-11-17 0 Buffer Overflow Attacks: Best Practices Against it in Cybersecurity.
Details Website 2024-11-17 1 Best Price On Top-rated VPN
Details Website 2024-11-17 1 Online Sale For Business VPN
Details Website 2024-11-17 0 TLS (Transport Layer Security)
Details Website 2024-11-17 0 T-Mobile Hack Linked To Chinese State Sponsored Hackers | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-11-17 0 ChatGPT Security Risks for Business: The Essential Checklist for Protection
Details Website 2024-11-17 0 Should You Use VPN with TOR? | TOR Over VPN Explained
Details Website 2024-11-17 1 Inside a Fictitious Cyber Breach: Artemis’ IT Vulnerability Report