mitre-atlas/ai-risk-databasePublic NotificationsYou must be signed in to change notification settings Fork2 Star51 Code Issues Projects main 2Branches0Tags Code Folders and files Name Last commit message Last commit date Latest commit lilyjw ...
Explore AI Supply Chain Risk with the AI Risk Database - ai-risk-database/requirements-test.txt at main · mitre-atlas/ai-risk-database
MITRE ATT&CK ENISA: European Union Agency for Cybersecurity ISO/IEC 27001 Information Security FIRST: Forum of Incident Response and Security Teams Exploit Database Awesome Penetration Testing Resources OpenAI Research Google AI Research Microsoft AI Research IBM Watson AI for Everyone (Coursera) Alerts...
We used ChatGPT to categorise and classify the thematically extracted raw data (see Tables 4–8) according to the MITRE ATT&CK Framework. The MITRE ATT&CK Framework is a comprehensive and detailed knowledge base of adversary tactics and techniques used in real-world attacks [100]. It describes...
In early October, MITRE announced itsAI Incident Sharing Initiative, which allows a community of member companies to access anonymous data about incidents affecting AI-enabled systems. At the end of that same month, Anthropic posted astrongly worded call for targeted AI regulation, saying governments...
[3] NIST. (2022). SP 800-161r1 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. [4] MITRE Corporation. (2023). MITRE ATT&CK Framework for Enterprise Environments.
MITRE ATT&CK Evaluations — Cortex XDR Among Elite in Endpoint Security Feb 19, 2025 ByPeter Havens Healthcare,Partners Curb Healthcare Costs — Can Cybersecurity Platformization Help? Feb 18, 2025 ByTroy AmentandTarun Sondhi Announcement,Application Security,Cloud Security,CNAPP,News and Events,Pro...
Basically, based on the interaction with the user, the LLM calls the plugin to perform some processing or retrieve data. We are using OWASP and MITRE terminology to define a plugin as a generic approach to extending the functionality of an LLM. Plugins can be implemented through specific LLM ...
TO SECURITY CERTIFICATES Input Validation and Buffer Overflow Privilege Escalation and Unauthorized Access Environmental Config and Deployment Risk Software Component Vulnerabilities Certificate Handling and TLS Security 0 5 10 15 Source: Common Vulnerabilities and Exposures (CVE) database by Mitre Corporation...
AI Risk Database MITRE AI Risk Repository MIT ARC AGI Common Corpus An ImageNet replacement for self-supervised pretraining without humans Huggingface Data Sets The Stack Frameworks A Framework for Ethical Decision Making Markkula Center for Applied Ethics Data Ethics Canvas Open Data Institute Deon ...