Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2024-11-17 0 Buffer Overflow Attacks: Best Practices Against it in Cybersecurity.
Details Website 2024-11-17 1 Best Price On Top-rated VPN
Details Website 2024-11-17 1 Online Sale For Business VPN
Details Website 2024-11-17 0 TLS (Transport Layer Security)
Details Website 2024-11-17 0 T-Mobile Hack Linked To Chinese State Sponsored Hackers | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-11-17 0 ChatGPT Security Risks for Business: The Essential Checklist for Protection
Details Website 2024-11-17 0 Should You Use VPN with TOR? | TOR Over VPN Explained
Details Website 2024-11-17 1 Inside a Fictitious Cyber Breach: Artemis’ IT Vulnerability Report
Details Website 2024-11-17 3 LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected
Details Website 2024-11-17 1 Cheap Secure VPN Offers
Details Website 2024-11-17 1 Shop For Affordable VPN
Details Website 2024-11-17 1 Shop For Top-rated VPN
Details Website 2024-11-17 1 Shop For Affordable VPN
Details Website 2024-11-17 7 1337UP CTF 2024 Writeups (partial)
Details Website 2024-11-17 1 Unihost hardware firewall review
Details Website 2024-11-17 2 Phishing emails increasingly use SVG attachments to evade detection
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 2 Securing Windows 11 with PowerShell: Privacy, Security, and Performance Optimization
Details Website 2024-11-16 2 China’s Salt Typhoon and Foreign Land Acquisitions — Dual Threats to America’s Security…
Details Website 2024-11-16 1 A journey of .NET AOT reverse engineering
Details Website 2024-11-16 22 Hunter Lab Cyber Defenders
Details Website 2024-11-16 0 McAfee+ Advanced 2025 Review: Your Identity’s Best Friend
Details Website 2024-11-16 0 AES vs. RSA: The Power Duo of Modern Encryption — What You Need to Know to Stay Secure
Details Website 2024-11-16 0 The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World
Details Website 2024-11-16 2 Guide to Becoming an Ethical Hacker: From Basics to Advanced Knowledge