From 8e9e19223dd3a8ef08b6fa694fc9d6a98ef6fe1d Mon Sep 17 00:00:00 2001 From: ramtherunner <34756719+ramtherunner@users.noreply.github.com> Date: Tue, 13 Oct 2020 00:23:40 -0700 Subject: [PATCH] Update case-studies-page.md --- pages/case-studies-page.md | 1 + 1 file changed, 1 insertion(+) diff --git a/pages/case-studies-page.md b/pages/case-studies-page.md index 4fd74fa..7393553 100644 --- a/pages/case-studies-page.md +++ b/pages/case-studies-page.md @@ -8,6 +8,7 @@ We chose **real world attacks on production ML systems** based on: ### ClearviewAI Misconfiguration **Summary of Incident:** Clearview AI's source code repository, though password protected, was misconfigured. This allowed an external researcher to register as a new user to the code repository and gain access to Clearview AI's credentials, keys to cloud storage buckets containing 70K video samples, copies of its applications and Slack tokens. + **Reported by:** Mossab Hussein (@mossab_hussein) **Source:**