Skip to content

Commit a8259bf

Browse files
committed
Release 4.9.1
1 parent d35fa01 commit a8259bf

3 files changed

Lines changed: 9 additions & 3 deletions

File tree

CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
# ATLAS Website Changelog
22

3+
## [4.9.1]() (2025-01-08)
4+
5+
- Fixed errors in 4.9.0 release notes.
6+
37
## [4.9.0]() (2025-12-24)
48

59
- Updated ATLAS data to [version 5.2.0](https://github.com/mitre-atlas/atlas-data/blob/main/CHANGELOG.md#520-2025-12-24)

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "atlas-website",
33
"type": "module",
4-
"version": "4.9.0",
4+
"version": "4.9.1",
55
"private": true,
66
"scripts": {
77
"build": "run-p type-check \"build-only {@}\" --",

public/content/update-files/2025-12.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,15 @@ It includes a large update to existing mitigations, adding missing links to adve
55
It also continues to add new adversary techniques targeting agentic AI systems.
66

77
The ATLAS knowledge base is built from community contributions. We want to acknowledge the following for their contributions for this release:
8-
- The members of the [Center for Threat-Informed Defense](https://ctid.mitre.org/) (CTID) [Secure AI](https://ctid.mitre.org/projects/secure-ai/) project for contributing to mitigations ane feedback on new case studies and techniques.
8+
- The members of the [Center for Threat-Informed Defense](https://ctid.mitre.org/) (CTID) [Secure AI](https://ctid.mitre.org/projects/secure-ai/) project for contributing to mitigations and feedback on new case studies and techniques.
99
- Zenity for contributing new adversary techniques and a case study targeting agentic systems:
1010
- [AI Service API](/techniques/AML.T0096)
1111
- [AI Agent Tool Credential Harvesting](/techniques/AML.T0098)
1212
- [AI Agent Tool Data Poisoning](/techniques/AML.T0099)
13+
- [AI Agent Clickbait](/techniques/AML.T0100)
14+
- [Data Destruction via AI Agent Tool Invocation](/techniques/AML.T0101)
1315
- [SesameOp: Novel backdoor uses OpenAI Assistants API for command and control](/studies/AML.CS0042)
14-
- US Bank (Joe Gumke and Dragan Damjanovic) and Vijay Lalwani (x_id: @VijayV_Lalwani for submitting [Malware Prototype with Embedded Prompt Injection](/studies/AML.CS0043)
16+
- US Bank (Joe Gumke and Dragan Damjanovic) and Vijay Lalwani (x_id: @VijayV_Lalwani) for submitting [Malware Prototype with Embedded Prompt Injection](/studies/AML.CS0043)
1517
- US Bank (Joe Gumke and Dragan Damjanovic) for updates to [Obtain Capabilities: Generative AI](/techniques/AML.T0016.002)
1618
- Ishan Dani for updates to [LLM Prompt Obfuscation](/techniques/AML.T0068)
1719
- Fujitsu Research of Europe for updates to [Prompt Infiltration via Public-Facing Application](/techniques/AML.T0093)

0 commit comments

Comments
 (0)