Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2024-11-16 0 Zero Trust Security: Pitfalls and How to Overcome Them
Details Website 2024-11-16 0 Centralized Root Access Management: Simplified with AWS Organizations
Details Website 2024-11-16 0 Biometrics: Their Advantages & Disadvantages
Details Website 2024-11-16 18 Browser’s Secret Diary: Memory Dumps Unveiled
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 0 The Mindset of a Penetration Tester
Details Website 2024-11-16 14 Building an Integrated Threat Intelligence Platform Using Python and Kibana
Details Website 2024-11-16 0 How to Add Windows Machines as Log Sources to QRadar: A Step-by-Step Guide
Details Website 2024-11-16 0 How Hackers Turn Your Information into a Weapon
Details Website 2024-11-16 0 A Definitive Guide to API Pentesting
Details Website 2024-11-16 0 I will write job winning software, tech, engineering, IT, faang, construction resume
Details Website 2024-11-16 4 External Pentest Command Checklist/Cheat sheet (Windows)
Details Website 2024-11-16 1 The Authorities Of The Internet: Understanding Certificate Authorities
Details Website 2024-11-16 1 [BLACKSUIT] - Ransomware Victim: brandywinecoachworks[.]com - RedPacket Security
Details Website 2024-11-16 1 [BLACKSUIT] - Ransomware Victim: kapurinc[.]com - RedPacket Security
Details Website 2024-11-16 0 Boost Your Cybersecurity Career With These 7 Hands-on Projects
Details Website 2024-11-16 25 How I Turned a Low Blind SSRF Into a Critical Vulnerability With Strategic Impact Escalation
Details Website 2024-11-16 0 Security Through the Lens of Statistical Distributions: When Normal Isn’t Normal
Details Website 2024-11-16 0 OWASP API Security 2024: Safeguarding the Digital Ecosystem
Details Website 2024-11-16 3 Why You Need a VPN on Public Wi-Fi: Your Digital Safety Net
Details Website 2024-11-16 0 The Importance Of Data Privacy In The Digital Age
Details Website 2024-11-16 1 Solid Security Pro Network Protection Review
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 0 Barbados Debates Cybercrime Bill - ADF International | #cybercrime | #infosec | National Cyber Security Consulting