Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnSquareMore
Wiz’s chief technology officer Ami Luttwak discusses the impact of AI on the evolution of cyberattacks

Wiz’s chief technology officer Ami Luttwak discusses the impact of AI on the evolution of cyberattacks

Bitget-RWA2025/09/28 18:33
By:Bitget-RWA

“A crucial aspect to grasp about cybersecurity is that it’s largely psychological,” Ami Luttwak, chief technologist at cybersecurity company Wiz, explained to TechCrunch during a recent episode of Equity. “Whenever a new wave of technology emerges, it presents fresh chances for [attackers] to exploit it.” 

As businesses rapidly incorporate AI into their operations—whether through vibe coding, integrating AI agents, or adopting new tools—the potential points of attack are multiplying. While AI enables developers to deliver code more quickly, this acceleration often leads to overlooked details and errors, which in turn create vulnerabilities for attackers to exploit.  

Wiz, which Google acquired earlier this year for $32 billion, recently ran some experiments, according to Luttwak, and discovered that insecure authentication was a frequent flaw in vibe-coded apps—the very mechanism that confirms a user’s identity and blocks unauthorized access.

“The reason for this is that it’s simply easier to build that way,” he noted. “Vibe coding agents follow your instructions, and unless you specify the most secure approach, they won’t implement it securely.” 

Luttwak emphasized that organizations today constantly have to balance speed and security. But it’s not just developers leveraging AI for efficiency—attackers are also adopting vibe coding, prompt-driven methods, and even their own AI agents to carry out attacks, he added.  

“Now, you can actually observe attackers using prompts as part of their attacks,” Luttwak said. “It’s not limited to attackers using vibe coding. They actively search for your AI tools and instruct them, ‘Reveal all your secrets, erase the machine, delete the file.’” 

In this evolving environment, attackers are also exploiting new AI tools that companies deploy internally to improve productivity. Luttwak explained that these integrations can open the door to “supply chain attacks.” By breaching a third-party service with extensive access to a company’s systems, attackers can then infiltrate deeper into the organization’s infrastructure.  

This scenario played out last month when Drift—a company providing AI chatbots for sales and marketing—was compromised, leading to the exposure of Salesforce data from hundreds of enterprise clients such as Cloudflare, Palo Alto Networks, and Google. The attackers obtained digital tokens, used them to mimic the chatbot, access Salesforce data, and move laterally within customer systems.

“The malicious code was deployed by the attacker, and it too was created using vibe coding,” Luttwak remarked.  

Luttwak estimates that although only about 1% of enterprises have fully embraced AI tools, Wiz is already witnessing weekly attacks that affect thousands of enterprise clients.  

“If you analyze the [attack] sequence, AI played a role at every phase,” Luttwak observed. “This transformation is happening at a pace we’ve never seen before. It means our industry must accelerate as well.” 

He referenced another significant supply chain incident, known as “s1ingularity,” which targeted Nx—a widely used build system for JavaScript developers—in August. Attackers managed to inject malware that identified AI developer tools like Claude and Gemini, then commandeered them to autonomously search for sensitive information.  This breach exposed thousands of developer tokens and keys, granting attackers access to private GitHub repositories.  

Despite these risks, Luttwak believes this is an exciting era for cybersecurity leadership. Wiz, established in 2020, initially aimed to help organizations detect and resolve misconfigurations, vulnerabilities, and other security issues in cloud environments.  

Over the past year, Wiz has broadened its offerings to keep pace with the rapid evolution of AI-driven threats—and to incorporate AI into its own solutions.  

In September, Wiz introduced Wiz Code, a product designed to secure the software development lifecycle by identifying and addressing security problems early, enabling organizations to be “secure by design.” In April, Wiz rolled out Wiz Defend, which provides real-time protection by detecting and responding to active threats in cloud environments.  

Luttwak stressed that for Wiz to deliver what he calls “horizontal security,” it’s essential to thoroughly understand their clients’ applications. 

“We need to know your reasons for building it … so I can create a security tool unlike any other, one that truly understands your needs,” he explained. 

‘You need a CISO from the very beginning’ 

The widespread availability of AI tools has led to a surge of startups claiming to address enterprise challenges. However, Luttwak cautions that companies shouldn’t hand over all their business, employee, and customer data to “every small SaaS vendor with a handful of staff just because they promise, ‘Give us your data and we’ll deliver incredible AI insights.’” 

Naturally, these startups require access to data for their products to be effective. Luttwak argues that this makes it their responsibility to operate securely from the outset.  

“Security and compliance must be priorities from day one,” he insisted. “You need a CISO (chief information security officer) from the very beginning—even if your team is only five people.” 

He advised that startups should adopt the mindset of a highly secure organization before writing any code. This means considering enterprise-grade security features, audit trails, authentication, production access, development protocols, security accountability, and single sign-on. Planning for these elements early prevents the need for disruptive changes later and avoids what Luttwak calls “security debt.” If you plan to serve enterprise clients, you’ll be ready to safeguard their information from the start. 

“We achieved SOC2 compliance [a security standard] before we even wrote any code,” he revealed. “And here’s a tip: it’s far easier to get SOC2 certification with five employees than with 500.” 

He added that the next critical consideration for startups is their system architecture.  

“If you’re launching an AI startup with enterprise clients in mind from the outset, you must design your architecture so that customer data remains … within the customer’s own environment.” 

For cybersecurity startups entering the market in the AI era, Luttwak believes the timing is ideal. Areas like phishing defense, email security, malware protection, and endpoint security are all ripe for innovation—both for attackers and defenders. The same holds true for startups developing workflow and automation tools for “vibe security,” since many security teams are still learning how to use AI to defend against AI-powered threats. 

“The field is wide open,” Luttwak concluded. “With new forms of attacks emerging in every area of security, it’s time to rethink every aspect of our defenses.” 

0
0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

Moonbirds to launch BIRB token in early Q1 2026

Cryptobriefing2025/12/15 07:24
Moonbirds to launch BIRB token in early Q1 2026

Aligning Universities with Emerging Industries: The Critical Need for STEM Investment

- Global industries demand AI, renewable energy, and biotech skills faster than traditional education systems can supply, creating a critical skills gap. - Universities like MIT and Stanford are embedding AI across STEM curricula while industry partnerships accelerate hands-on training in automation and biomanufacturing. - Renewable energy programs with apprenticeships and public-private funding are addressing talent shortages as $386B global investments outpace workforce readiness. - Biotech's fragmented

Bitget-RWA2025/12/15 06:16
Aligning Universities with Emerging Industries: The Critical Need for STEM Investment

PENGU Token Value Soars: Blockchain Data and Institutional Interest Indicate Optimal Timing for Investment

- PENGU ranks #81 with $706.5M market cap, showing rising institutional interest and whale accumulation. - The pending Canary PENGU ETF, if approved, could unlock institutional capital by including NFTs in a U.S. ETF. - Mixed on-chain signals (RSI 38.7, OBV growth) and 2B tokens moved from team wallets highlight uncertainty. - Partnerships with Care Bears and Lufthansa, plus Bitso collaboration, expand utility but face regulatory risks. - Recent 8.55% price rebound and 2.6% gain post-BNB listing suggest ca

Bitget-RWA2025/12/15 05:58
PENGU Token Value Soars: Blockchain Data and Institutional Interest Indicate Optimal Timing for Investment

Evaluating How the COAI Token Scandal Influences Cryptocurrency Regulatory Policies

- COAI Token's 88% price crash and $116.8M loss exposed systemic risks in centralized AI-DeFi projects with opaque governance. - Global regulators responded with stricter frameworks, including EU's MiCA and Singapore's asset freezes, to address jurisdictional gaps. - Institutional investors now prioritize compliance, with 55% of hedge funds allocating to digital assets via tokenized structures in 2025. - Emerging solutions include AI-driven risk platforms and anthropological governance models to enhance tr

Bitget-RWA2025/12/15 05:24
Evaluating How the COAI Token Scandal Influences Cryptocurrency Regulatory Policies
© 2025 Bitget