We've added 8 new attack techniques and a new case study to ATLAS as a result of our collaboration with Zenity! These additions expand the MITRE ATLAS knowledge base to cover more #GenAI attack vectors by integrating some of their work on the GenAI Attacks Matrix. The new techniques detail how attackers can exploit an AI-enabled system to have a targeted impact on the end user, particularly when interacting with a GenAI system. The new case study is focused on "Financial Transaction Hijacking with M365 Copilot as an Insider". Through our ongoing collaboration, we’ll continue to expand upon these resources with new case studies and techniques, helping organizations stay ahead of threats to AI-enabled systems. See more about the new ATLAS case study from Zenity’s video overview on the attack vector ➡️ https://lnkd.in/d-sZyEZe #AI #Cybersecurity #AIsecurity #MITREatlas
🤝 We are SO excited to announce a new collaboration with MITRE, introducing 8 new attack techniques and 4 sub-techniques from the Zenity GenAI Attacks Matrix into the MITRE ATLAS framework. 🤲 In doing so, enterprises can better understand and stay ahead of evolving AI threats from a unified and known attack framework. Check out the updated ATLAS framework here! https://lnkd.in/ghQGSzPR and check out Marina Simakov's Zenity Labs blog in comments below.