Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 0 | Zero Trust Security: Pitfalls and How to Overcome Them | ||
Details | Website | 2024-11-16 | 0 | Centralized Root Access Management: Simplified with AWS Organizations | ||
Details | Website | 2024-11-16 | 0 | Biometrics: Their Advantages & Disadvantages | ||
Details | Website | 2024-11-16 | 18 | Browser’s Secret Diary: Memory Dumps Unveiled | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 90 | From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 0 | The Mindset of a Penetration Tester | ||
Details | Website | 2024-11-16 | 14 | Building an Integrated Threat Intelligence Platform Using Python and Kibana | ||
Details | Website | 2024-11-16 | 0 | How to Add Windows Machines as Log Sources to QRadar: A Step-by-Step Guide | ||
Details | Website | 2024-11-16 | 0 | How Hackers Turn Your Information into a Weapon | ||
Details | Website | 2024-11-16 | 0 | A Definitive Guide to API Pentesting | ||
Details | Website | 2024-11-16 | 0 | I will write job winning software, tech, engineering, IT, faang, construction resume | ||
Details | Website | 2024-11-16 | 4 | External Pentest Command Checklist/Cheat sheet (Windows) | ||
Details | Website | 2024-11-16 | 1 | The Authorities Of The Internet: Understanding Certificate Authorities | ||
Details | Website | 2024-11-16 | 1 | [BLACKSUIT] - Ransomware Victim: brandywinecoachworks[.]com - RedPacket Security | ||
Details | Website | 2024-11-16 | 1 | [BLACKSUIT] - Ransomware Victim: kapurinc[.]com - RedPacket Security | ||
Details | Website | 2024-11-16 | 0 | Boost Your Cybersecurity Career With These 7 Hands-on Projects | ||
Details | Website | 2024-11-16 | 25 | How I Turned a Low Blind SSRF Into a Critical Vulnerability With Strategic Impact Escalation | ||
Details | Website | 2024-11-16 | 0 | Security Through the Lens of Statistical Distributions: When Normal Isn’t Normal | ||
Details | Website | 2024-11-16 | 0 | OWASP API Security 2024: Safeguarding the Digital Ecosystem | ||
Details | Website | 2024-11-16 | 3 | Why You Need a VPN on Public Wi-Fi: Your Digital Safety Net | ||
Details | Website | 2024-11-16 | 0 | The Importance Of Data Privacy In The Digital Age | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Network Protection Review | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | Barbados Debates Cybercrime Bill - ADF International | #cybercrime | #infosec | National Cyber Security Consulting |