To make the Machine Learning (ML) model learn the wrong thing, adversaries can target the model’s training data, foundational models, or both. Adversaries exploit this class of vulnerabilities to influence models using data and parameter manipulation
All Articles (4)
A sophisticated stealer-as-a-ransomware threat dubbed RedEnergy has been spotted in the wild, targeting energy utilities, oil, gas, telecom, and machinery sectors. Following a successful breach, the malicious binary is used as a conduit to set up pe
A new process injection technique named 'Mockingjay' could allow threat actors to bypass EDR (Endpoint Detection and Response) and other security products to execute malicious code on compromised systems stealthily. Tests showed that this remote inje
U.S. government agencies and many other organizations like newspapers, banks, and biotech companies have fallen victim to infiltration via exploits in the file transfer software MOVEit. In this week's REDSHORT, we will review the details of the explo
WEEKLY WEBINAR REDSHORT REGISTRATION
Register for our LIVE REDSHORT. webinars and never miss our weekly broadcast. RED' as in something important from Red Sky Alliance and 'SHORT' as in 10 minutes or less. We will cover highlights of trending topics.
Comments
You need to be a member of Red Sky Alliance to add comments!
Comments are closed.
Comments