Common Information
Type | Value |
---|---|
Value |
Datasets |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may collect public datasets to use in their operations. Datasets used by the victim organization or datasets that are representative of the data used by the victim organization may be valuable to adversaries. Datasets can be stored in cloud storage, or on victim-owned websites. Some datasets require the adversary to [Establish Accounts](/techniques/AML.T0021) for access. Acquired datasets help the adversary advance their operations, stage attacks, and tailor attacks to the victim organization. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 0 | AI Model Robustness: A New Frontier in Cybersecurity | ||
Details | Website | 2024-11-17 | 1 | [CHORT] - Ransomware Victim: edwardsburgschoolsfoundation[.]org - RedPacket Security | ||
Details | Website | 2024-11-17 | 0 | [CyberSec Pills] Elevating Cybersecurity with Jupyter Notebook | ||
Details | Website | 2024-11-17 | 0 | ChatGPT Security Risks for Business: The Essential Checklist for Protection | ||
Details | Website | 2024-11-16 | 0 | Security Through the Lens of Statistical Distributions: When Normal Isn’t Normal | ||
Details | Website | 2024-11-16 | 2 | Setting Up Filters for Effective Wireshark Analysis | ||
Details | Website | 2024-11-16 | 0 | Exploring Side-Channel Attacks: Understanding the Risks and Defenses | ||
Details | Website | 2024-11-16 | 0 | Top 5 Technologies to Learn In 2024 | ||
Details | Website | 2024-11-16 | 2 | AI Models for Decompilation | ||
Details | Website | 2024-11-15 | 0 | Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2024-11-15 | 4 | How to Create Realistic Test Data for Amazon Redshift | ||
Details | Website | 2024-11-15 | 4 | The Value of Database Subsetting | ||
Details | Website | 2024-11-15 | 2 | Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights | ||
Details | Website | 2024-11-15 | 7 | Shapeshifters: The Nature of Leaked Data | ||
Details | Website | 2024-11-15 | 0 | How do I start learning AI for Beginners | ||
Details | Website | 2024-11-15 | 1 | OWASP Top 10 for LLMs: Protecting GenAI with AiFort | ||
Details | Website | 2024-11-15 | 0 | AI in Cybersecurity: Enhancing Threat Detection and Response for Enterprises | ||
Details | Website | 2024-11-15 | 0 | How AI is Revolutionizing Application Security: Real-Life Impact and Future Potential 🚀 | ||
Details | Website | 2024-11-15 | 0 | AI in IT Auditing: The Game-Changer for Smarter, Faster, and Safer Audits | ||
Details | Website | 2024-11-15 | 0 | Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 0 | 3 Ways AI Does It | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 0 | AI-powered Cybersecurity in 2025: Safeguarding the Digital Frontier | ||
Details | Website | 2024-11-14 | 0 | 2025 Predictions — How One Year Will Redefine the Cybersecurity Industry | ||
Details | Website | 2024-11-14 | 4 | “Free Hugs” – What To Be Wary of in Hugging Face – Part 1 | ||
Details | Website | 2024-11-14 | 4 | “Free Hugs” – What To Be Wary of in Hugging Face – Part 1 |