Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 0 | Buffer Overflow Attacks: Best Practices Against it in Cybersecurity. | ||
Details | Website | 2024-11-17 | 1 | Best Price On Top-rated VPN | ||
Details | Website | 2024-11-17 | 1 | Online Sale For Business VPN | ||
Details | Website | 2024-11-17 | 0 | TLS (Transport Layer Security) | ||
Details | Website | 2024-11-17 | 0 | T-Mobile Hack Linked To Chinese State Sponsored Hackers | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 0 | ChatGPT Security Risks for Business: The Essential Checklist for Protection | ||
Details | Website | 2024-11-17 | 0 | Should You Use VPN with TOR? | TOR Over VPN Explained | ||
Details | Website | 2024-11-17 | 1 | Inside a Fictitious Cyber Breach: Artemis’ IT Vulnerability Report | ||
Details | Website | 2024-11-17 | 3 | LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected | ||
Details | Website | 2024-11-17 | 1 | Cheap Secure VPN Offers | ||
Details | Website | 2024-11-17 | 1 | Shop For Affordable VPN | ||
Details | Website | 2024-11-17 | 1 | Shop For Top-rated VPN | ||
Details | Website | 2024-11-17 | 1 | Shop For Affordable VPN | ||
Details | Website | 2024-11-17 | 7 | 1337UP CTF 2024 Writeups (partial) | ||
Details | Website | 2024-11-17 | 1 | Unihost hardware firewall review | ||
Details | Website | 2024-11-17 | 2 | Phishing emails increasingly use SVG attachments to evade detection | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 2 | Securing Windows 11 with PowerShell: Privacy, Security, and Performance Optimization | ||
Details | Website | 2024-11-16 | 2 | China’s Salt Typhoon and Foreign Land Acquisitions — Dual Threats to America’s Security… | ||
Details | Website | 2024-11-16 | 1 | A journey of .NET AOT reverse engineering | ||
Details | Website | 2024-11-16 | 22 | Hunter Lab Cyber Defenders | ||
Details | Website | 2024-11-16 | 0 | McAfee+ Advanced 2025 Review: Your Identity’s Best Friend | ||
Details | Website | 2024-11-16 | 0 | AES vs. RSA: The Power Duo of Modern Encryption — What You Need to Know to Stay Secure | ||
Details | Website | 2024-11-16 | 0 | The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World | ||
Details | Website | 2024-11-16 | 2 | Guide to Becoming an Ethical Hacker: From Basics to Advanced Knowledge |