In this article, we demonstrate and describe how a single intentionally formatted text string inside a densely packed big data file (e.g., malicious payload) containing millions of other valid data points was used to trigger a Remote Code Execution (“RCE”) exploit.
data poisoning
Don’t Underestimate The Importance of Characterizing Your Data Supply Chain
It is critical in both your traditional and AI-driven data analytics to take proactive steps to “characterize” your data supply chain.