Exfiltration (6 techniques)

MITRE ATLAS tactic

The adversary is trying to steal AI artifacts or other information about the AI system. Exfiltration consists of techniques that adversaries may use to steal data from your network. Data may be stolen for its valuable intellectual property, or for use in staging future operations. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.

Techniques

AI red teaming training, taught by practitioners.

Hands-on courses on adversarial AI, prompt injection, and AI security operations.

View AI Security Courses