Common Information
Type Value
Value
Datasets
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Adversaries may collect public datasets to use in their operations. Datasets used by the victim organization or datasets that are representative of the data used by the victim organization may be valuable to adversaries. Datasets can be stored in cloud storage, or on victim-owned websites. Some datasets require the adversary to [Establish Accounts](/techniques/AML.T0021) for access. Acquired datasets help the adversary advance their operations, stage attacks, and tailor attacks to the victim organization.
Details Published Attributes CTI Title
Details Website 2024-11-17 0 AI Model Robustness: A New Frontier in Cybersecurity
Details Website 2024-11-17 1 [CHORT] - Ransomware Victim: edwardsburgschoolsfoundation[.]org - RedPacket Security
Details Website 2024-11-17 0 [CyberSec Pills] Elevating Cybersecurity with Jupyter Notebook
Details Website 2024-11-17 0 ChatGPT Security Risks for Business: The Essential Checklist for Protection
Details Website 2024-11-16 0 Security Through the Lens of Statistical Distributions: When Normal Isn’t Normal
Details Website 2024-11-16 2 Setting Up Filters for Effective Wireshark Analysis
Details Website 2024-11-16 0 Exploring Side-Channel Attacks: Understanding the Risks and Defenses
Details Website 2024-11-16 0 Top 5 Technologies to Learn In 2024
Details Website 2024-11-16 2 AI Models for Decompilation
Details Website 2024-11-15 0 Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-11-15 4 How to Create Realistic Test Data for Amazon Redshift
Details Website 2024-11-15 4 The Value of Database Subsetting
Details Website 2024-11-15 2 Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights
Details Website 2024-11-15 7 Shapeshifters: The Nature of Leaked Data
Details Website 2024-11-15 0 How do I start learning AI for Beginners
Details Website 2024-11-15 1 OWASP Top 10 for LLMs: Protecting GenAI with AiFort
Details Website 2024-11-15 0 AI in Cybersecurity: Enhancing Threat Detection and Response for Enterprises
Details Website 2024-11-15 0 How AI is Revolutionizing Application Security: Real-Life Impact and Future Potential 🚀
Details Website 2024-11-15 0 AI in IT Auditing: The Game-Changer for Smarter, Faster, and Safer Audits
Details Website 2024-11-15 0 Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-14 0 3 Ways AI Does It | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-14 0 AI-powered Cybersecurity in 2025: Safeguarding the Digital Frontier
Details Website 2024-11-14 0 2025 Predictions — How One Year Will Redefine the Cybersecurity Industry
Details Website 2024-11-14 4 “Free Hugs” – What To Be Wary of in Hugging Face – Part 1
Details Website 2024-11-14 4 “Free Hugs” – What To Be Wary of in Hugging Face – Part 1