Common Information
Type Value
Value
Model
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Machine learning systems often rely on open sourced models in various ways. Most commonly, the victim organization may be using these models for fine tuning. These models will be downloaded from an external source and then used as the base for the model as it is tuned on a smaller, private dataset. Loading models often requires executing some saved code in the form of a saved model file. These can be compromised with traditional malware, or through some adversarial machine learning techniques.
Details Published Attributes CTI Title
Details Website 2070-01-03 13 越狱 Llama-3.1-8B-Instruct | CTF导航
Details Website 2028-10-24 0 MIT Technology Review Insights Survey on Zero Trust in Cybersecurity
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2024-12-30 27 Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware
Details Website 2024-12-29 2 Cobalt Strike DFIR: Listening to the Pipes — Blake's R&D
Details Website 2024-12-11 16 Mastering Third-Party Risk Management: A Comprehensive Guide to Mitigating Supply Chain Threats
Details Website 2024-12-11 11 Easy Captcha Image Solver using Grounded SAM
Details Website 2024-12-11 0 Digital Transformation in Business: How big data is influencing business decision-making?
Details Website 2024-12-11 0 Apple iPhone Users Warned About Data-Stealing Vulnerability in TCC Feature - Cybersecurity Insiders
Details Website 2024-12-11 43 Microsoft Patch Tuesday, December 2024 Security Update Review – Qualys ThreatPROTECT
Details Website 2024-12-11 0 Holiday Scams Targeting Children
Details Website 2024-12-10 0 A Year of Code, Struggles, and Resilience
Details Website 2024-12-10 11 TryHackMe, Windows Fundamentals (Part II)
Details Website 2024-12-10 73 Microsoft Patch Tuesday, December 2024, Patch for 16 Critical Security Flaws
Details Website 2024-12-10 1 Living Off the Land - Secure Boot Style
Details Website 2024-12-10 2 Staying Ahead: The Role of NHIDR in Modern Cybersecurity
Details Website 2024-12-10 0 Nearest Neighbor: remote attacks on Wi-Fi networks
Details Website 2024-12-10 0 Hackers Exploit AWS Misconfigurations in Massive Data Breach
Details Website 2024-12-10 0 Sophos AI to present on how to defang malicious AI models at Black Hat Europe
Details Website 2024-12-10 0 How Chat GPT Turned Me In To A Hacker
Details Website 2024-12-10 0 Automated AI fuzzing targets open-source LLM vulnerabilities
Details Website 2024-12-10 1 When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs
Details Website 2024-12-10 2 How to Build a Cloud Security Strategy for Your SMB
Details Website 2024-12-10 0 The state of AppSec tooling: 4 ways to step up to modern software security
Details Website 2024-12-10 2 Building a Robust Security Posture: The First Step is Knowing Your Assets