- Tactics
- Exfiltration
- Maturity
- realized
- Reference
- atlas.mitre.org/techniques/AML.T0025
Description
Adversaries may exfiltrate AI artifacts or other information relevant to their goals via traditional cyber means.
See the ATT&CK Exfiltration tactic for more information.
How GTK Cyber trains on this
GTK Cyber's hands-on AI security courses cover adversarial-AI techniques across the MITRE ATLAS framework, including the Exfiltration tactic this technique falls under. Our practitioner-led training is taught by Charles Givre and other field-tested SMEs and focuses on real adversarial scenarios, not slide decks.