Common Information
Type | Value |
---|---|
Value |
Model |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Machine learning systems often rely on open sourced models in various ways. Most commonly, the victim organization may be using these models for fine tuning. These models will be downloaded from an external source and then used as the base for the model as it is tuned on a smaller, private dataset. Loading models often requires executing some saved code in the form of a saved model file. These can be compromised with traditional malware, or through some adversarial machine learning techniques. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2070-01-03 | 13 | 越狱 Llama-3.1-8B-Instruct | CTF导航 | ||
Details | Website | 2028-10-24 | 0 | MIT Technology Review Insights Survey on Zero Trust in Cybersecurity | ||
Details | Website | 2025-11-07 | 1 | Vault7 - Home | ||
Details | Website | 2024-12-30 | 27 | Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware | ||
Details | Website | 2024-12-29 | 2 | Cobalt Strike DFIR: Listening to the Pipes — Blake's R&D | ||
Details | Website | 2024-12-11 | 16 | Mastering Third-Party Risk Management: A Comprehensive Guide to Mitigating Supply Chain Threats | ||
Details | Website | 2024-12-11 | 11 | Easy Captcha Image Solver using Grounded SAM | ||
Details | Website | 2024-12-11 | 0 | Digital Transformation in Business: How big data is influencing business decision-making? | ||
Details | Website | 2024-12-11 | 0 | Apple iPhone Users Warned About Data-Stealing Vulnerability in TCC Feature - Cybersecurity Insiders | ||
Details | Website | 2024-12-11 | 43 | Microsoft Patch Tuesday, December 2024 Security Update Review – Qualys ThreatPROTECT | ||
Details | Website | 2024-12-11 | 0 | Holiday Scams Targeting Children | ||
Details | Website | 2024-12-10 | 0 | A Year of Code, Struggles, and Resilience | ||
Details | Website | 2024-12-10 | 11 | TryHackMe, Windows Fundamentals (Part II) | ||
Details | Website | 2024-12-10 | 73 | Microsoft Patch Tuesday, December 2024, Patch for 16 Critical Security Flaws | ||
Details | Website | 2024-12-10 | 1 | Living Off the Land - Secure Boot Style | ||
Details | Website | 2024-12-10 | 2 | Staying Ahead: The Role of NHIDR in Modern Cybersecurity | ||
Details | Website | 2024-12-10 | 0 | Nearest Neighbor: remote attacks on Wi-Fi networks | ||
Details | Website | 2024-12-10 | 0 | Hackers Exploit AWS Misconfigurations in Massive Data Breach | ||
Details | Website | 2024-12-10 | 0 | Sophos AI to present on how to defang malicious AI models at Black Hat Europe | ||
Details | Website | 2024-12-10 | 0 | How Chat GPT Turned Me In To A Hacker | ||
Details | Website | 2024-12-10 | 0 | Automated AI fuzzing targets open-source LLM vulnerabilities | ||
Details | Website | 2024-12-10 | 1 | When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs | ||
Details | Website | 2024-12-10 | 2 | How to Build a Cloud Security Strategy for Your SMB | ||
Details | Website | 2024-12-10 | 0 | The state of AppSec tooling: 4 ways to step up to modern software security | ||
Details | Website | 2024-12-10 | 2 | Building a Robust Security Posture: The First Step is Knowing Your Assets |