Common Information
Type | Value |
---|---|
Value |
GPU Hardware |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Most machine learning systems require access to certain specialized hardware, typically GPUs. Adversaries can target machine learning systems by specifically targeting the GPU supply chain. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-01 | 1 | Critical NVIDIA vulnerability could allow full host takeover | ||
Details | Website | 2024-09-24 | 6 | Google & Arm - Raising The Bar on GPU Security | ||
Details | Website | 2024-09-23 | 0 | Broken Hill: A Productionized Greedy Coordinate Gradient Attack Tool… | ||
Details | Website | 2024-01-01 | 0 | Blog, News & Press Releases - Field Effect | Field Effect Security Intelligence Team | ||
Details | Website | 2024-01-01 | 0 | Blog, News & Press Releases - Field Effect | Security intelligence | ||
Details | Website | 2023-06-30 | 18 | Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures | ||
Details | Website | 2023-06-29 | 0 | Using salt to fight dictionaries: Securely handling geolocation data (1/2) | ||
Details | Website | 2023-05-09 | 2 | Cybersecurity in the AI Era | ||
Details | Website | 2022-12-28 | 13 | “MasquerAds” — Google’s Ad-Words Massively Abused by Threat Actors, Targeting Organizations, GPUs… | ||
Details | Website | 2022-10-06 | 4 | Search | arXiv e-print repository | ||
Details | Website | 2020-09-08 | 6 | Attacking the Qualcomm Adreno GPU | ||
Details | Website | 2019-02-05 | 25 | InfoSec Handlers Diary Blog - SANS Internet Storm Center | ||
Details | Website | 2018-01-31 | 23 | Ransom Where? Malicious Cryptocurrency Miners Takeover, Generating Millions | ||
Details | Website | 2018-01-31 | 22 | Ransom Where? Malicious Cryptocurrency Miners Takeover, Generating Millions |