Close Menu
MMJ News NetworkMMJ News Network
  • Home
  • Cannabis
  • Psychedelics
  • Crypto & Web3
  • AI
  • CBD
  • Wellness & Counterculture
  • MMJNEWS

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

OpenAI is launching the Sora app, its own TikTok competitor, alongside the Sora 2 model

September 30, 2025

Early Bitcoin Investor Reveals Biggest Regret After Years In The Market

September 30, 2025

Anchorage Digital Expands Institutional Access to Solana DeFi With Jupiter Integration

September 30, 2025
Facebook X (Twitter) Instagram
MMJ News NetworkMMJ News Network
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • Home
  • Cannabis
  • Psychedelics
  • Crypto & Web3
  • AI
  • CBD
  • Wellness & Counterculture
  • MMJNEWS
MMJ News NetworkMMJ News Network
Home » Wiz chief technologist Ami Luttwak on how AI is transforming cyberattacks 
AI

Wiz chief technologist Ami Luttwak on how AI is transforming cyberattacks 

EditorBy EditorSeptember 28, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


“One of the key things to understand about cybersecurity is that it’s a mind game,” Ami Luttwak, chief technologist at cybersecurity firm Wiz, told TechCrunch on a recent episode of Equity. “If there’s a new technology wave coming, there are new opportunities for [attackers] to start using it.” 

As enterprises rush to embed AI into their workflows — whether through vibe coding, AI agent integration, or new tooling — the attack surface is expanding. AI helps developers ship code faster, but that speed often comes with shortcuts and mistakes, creating new openings for attackers.  

Wiz, which was acquired by Google earlier this year for $32 billion, conducted tests recently, says Luttwak, and found that a common issue in vibe coded applications was insecure implementation of the authentication — the system that verifies a user’s identity and ensures they’re not an attacker.

“That happened because it was just easier to build like that,” he said. “Vibe coding agents do what you say, and if you didn’t tell them to build it in the most secure way, it won’t.” 

Luttwak noted that there’s a constant tradeoff today for companies choosing between being fast and being secure. But developers aren’t the only ones using AI to move faster. Attackers are now using vibe coding, prompt-based techniques, and even their own AI agents to launch exploits, he said.  

“You can actually see the attacker is now using prompts to attack,” Luttwak said. “It’s not just the attacker vibe coding. The attacker looks for AI tools that you have and tells them, ‘Send me all your secrets, delete the machine, delete the file.’” 

Amid this landscape, attackers are also finding entry points in new AI tools that companies roll out internally to boost efficiency. Luttwak says these integrations can lead to “supply chain attacks.” By compromising a third-party service that has broad access to a company’s infrastructure, attackers can then pivot deeper into corporate systems.  

Techcrunch event

San Francisco
|
October 27-29, 2025

That’s what happened last month when Drift — a startup that sells AI chatbots for sales and marketing — was breached, exposing the Salesforce data of hundreds of enterprise customers like Cloudflare, Palo Alto Networks, and Google. The attackers gained access to tokens, or digital keys, and used them to impersonate the chatbot, query Salesforce data, and move laterally inside customer environments.

“The attacker pushed the attack code, which was also created using vibe coding,” Luttwak said.  

Luttwak says that while enterprise adoption of AI tools is still minimal — he reckons around 1% of enterprises have fully adopted AI — Wiz is already seeing attacks every week that impact thousands of enterprise customers.  

“And if you look at the [attack] flow, AI was embedded at every step,” Luttwak said. “This revolution is faster than any revolution we’ve seen in the past. It means that we as an industry need to move faster.” 

Luttwak pointed to another major supply chain attack, dubbed “s1ingularity,” in August on Nx, a popular build system for JavaScript developers. Attackers managed to unleash malware into the system, which then detected the presence of AI developer tools like Claude and Gemini and hijacked them to autonomously scan the system for valuable data.  The attack compromised thousands of developer tokens and keys, giving attackers access to private GitHub repositories.  

Luttwak says that despite the threats, this has been an exciting time to be a leader in cybersecurity. Wiz, founded in 2020, was originally focused on helping organizations identify and address misconfigurations, vulnerabilities, and other security risks across cloud environments.  

Over the last year, Wiz has expanded its capabilities to keep up with the speed of AI-related attacks — and to use AI for its own products.  

Last September, Wiz launched Wiz Code that focuses on securing the software development lifecycle by identifying and mitigating security issues early in the development process, so companies can be “secure by design.” In April, Wiz launched Wiz Defend, which offers runtime protection by detecting and responding to active threats within cloud environments.  

Luttwak said that it’s vital for Wiz to fully understand the applications of their customers if the startup is going to help with what he calls “horizontal security.” 

“We need to understand why you’re building it … so I can build the security tool that no one has ever had before, the security tool that understands you,” he said. 

‘From day one, you need to have a CISO’ 

The democratization of AI tools has resulted in a flood of new startups promising to solve enterprise pain points. But Luttwak says enterprises shouldn’t just send all of their company, employee, and customer data to “every small SaaS company that has five employees just because they say, ‘Give me all your data, and I will give you amazing AI insights.’” 

Of course, those startups need that data if their offering is going to have any value. Luttwak says that means it’s incumbent upon them to make sure they’re operating like a secure organization from the start.  

“From day one, you need to think about security and compliance,” he said. “From day one, you need to have a CISO (chief information security officer). Even if you have five people.” 

Before writing a single line of code, startups should think like a highly secure organization, he said. They need to consider enterprise security features, audit logs, authentication, access to production, development practices, security ownership, and single sign-on. Planning this way from the start means you won’t have to overhaul processes later and incur what Luttwak calls “security debt.” And if you aim to sell to enterprises, you’ll already be prepared to protect their data. 

“We were SOC2 compliant [a compliance framework] before we had code,” he said. “And I can tell you a secret. Getting SOC2 compliance for five employees is much easier than for 500 employees.” 

The next most important step for startups is to think about architecture, he said.  

“If you’re an AI startup that wants to focus on enterprise from day one, you have to think about an architecture that allows the data of the customer to stay … in the customer environment.” 

For cybersecurity startups looking to step into the field in the age of AI, Luttwak says now’s the time. Everything from phishing protection and email security to malware and endpoint protection is fertile ground for innovation ‚ both for attackers and defenders. The same is true for startups that could help with workflow and automation tools to do “vibe security,” since many security teams still don’t know how to use AI to defend against AI. 

“The game is open,” Luttwak said. “If every area of security now has new attacks, then it means we have to rethink every part of security.” 



Source link

AI ami luttwak cybersecurity wiz
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Editor
  • Website
  • Facebook
  • Instagram

Related Posts

OpenAI is launching the Sora app, its own TikTok competitor, alongside the Sora 2 model

September 30, 2025

Adobe’s video editing app Premiere arrives on iPhones

September 30, 2025

CommanderAI says it’s building the Salesforce for the waste management industry

September 30, 2025
Leave A Reply Cancel Reply

Don't Miss
AI

OpenAI is launching the Sora app, its own TikTok competitor, alongside the Sora 2 model

On Tuesday, OpenAI announced the release of Sora 2, an audio and video generator to…

Early Bitcoin Investor Reveals Biggest Regret After Years In The Market

September 30, 2025

Anchorage Digital Expands Institutional Access to Solana DeFi With Jupiter Integration

September 30, 2025

Bybit Traders Push BTC Taker Buy/Sell Ratio Above 24

September 30, 2025
Top Posts

Trump Promotes Hemp-Derived CBD For Senior Health Care in Shared Video

September 30, 2025

Steel Your Cannabis Crops Against Iron Deficiency

September 29, 2025

Massachusetts Initiative Petition to Kill Adult-Use Market Leads CBT’s Top Stories in September

September 26, 2025

Cannabis Advertising Compliance 2026: Strategies That Scale

September 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to MMJ News Network, your premier source for cutting-edge insights into cannabis, psychedelics, crypto & Web3, wellness, counterculture, and market trends. We are dedicated to bringing you the latest news, research, and developments shaping these fast-evolving industries.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

OpenAI is launching the Sora app, its own TikTok competitor, alongside the Sora 2 model

September 30, 2025

Early Bitcoin Investor Reveals Biggest Regret After Years In The Market

September 30, 2025

Anchorage Digital Expands Institutional Access to Solana DeFi With Jupiter Integration

September 30, 2025
Most Popular

Ethereum Falls as Crypto Exchange Bybit Confirms $1.4 Billion Hack

February 21, 2025

Florida Woman Accused of $850K Trump Solana Meme Coin Theft, Faces Deportation

February 21, 2025

Bitcoin, XRP and Dogecoin Sink Amid Inflation Fears and Bybit Hack Fallout

February 23, 2025
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 mmjnewsnetwork. Designed by mmjnewsnetwork.

Type above and press Enter to search. Press Esc to cancel.