Wiz chief technologist Ami Luttwak on how AI is transforming cyberattacks 

6 months ago 59

“One of the cardinal things to recognize astir cybersecurity is that it’s a caput game,” Ami Luttwak, main technologist astatine cybersecurity steadfast Wiz, told TechCrunch connected a recent occurrence of Equity. “If there’s a caller exertion question coming, determination are caller opportunities for [attackers] to commencement utilizing it.” 

As enterprises unreserved to embed AI into their workflows — whether done vibe coding, AI cause integration, oregon caller tooling — the onslaught aboveground is expanding. AI helps developers vessel codification faster, but that velocity often comes with shortcuts and mistakes, creating caller openings for attackers.  

Wiz, which was acquired by Google earlier this twelvemonth for $32 billion, conducted tests recently, says Luttwak, and recovered that a communal contented successful vibe coded applications was insecure implementation of the authentication — the strategy that verifies a user’s individuality and ensures they’re not an attacker.

“That happened due to the fact that it was conscionable easier to physique similar that,” helium said. “Vibe coding agents bash what you say, and if you didn’t archer them to physique it successful the astir unafraid way, it won’t.” 

Luttwak noted that there’s a changeless tradeoff contiguous for companies choosing betwixt being accelerated and being secure. But developers aren’t the lone ones utilizing AI to determination faster. Attackers are present utilizing vibe coding, prompt-based techniques, and adjacent their ain AI agents to motorboat exploits, helium said.  

“You tin really spot the attacker is present utilizing prompts to attack,” Luttwak said. “It’s not conscionable the attacker vibe coding. The attacker looks for AI tools that you person and tells them, ‘Send maine each your secrets, delete the machine, delete the file.’” 

Amid this landscape, attackers are besides uncovering introduction points successful caller AI tools that companies rotation retired internally to boost efficiency. Luttwak says these integrations tin pb to “supply concatenation attacks.” By compromising a third-party work that has wide entree to a company’s infrastructure, attackers tin past pivot deeper into firm systems.  

Techcrunch event

San Francisco | October 27-29, 2025

That’s what happened past period erstwhile Drift — a startup that sells AI chatbots for income and selling — was breached, exposing the Salesforce information of hundreds of endeavor customers similar Cloudflare, Palo Alto Networks, and Google. The attackers gained entree to tokens, oregon integer keys, and utilized them to impersonate the chatbot, query Salesforce data, and determination laterally wrong lawsuit environments.

“The attacker pushed the onslaught code, which was besides created utilizing vibe coding,” Luttwak said.  

Luttwak says that portion endeavor adoption of AI tools is inactive minimal — helium reckons astir 1% of enterprises person afloat adopted AI — Wiz is already seeing attacks each week that interaction thousands of endeavor customers.  

“And if you look astatine the [attack] flow, AI was embedded astatine each step,” Luttwak said. “This gyration is faster than immoderate gyration we’ve seen successful the past. It means that we arsenic an manufacture request to determination faster.” 

Luttwak pointed to different large proviso concatenation attack, dubbed “s1ingularity,” successful August connected Nx, a fashionable physique strategy for JavaScript developers. Attackers managed to unleash malware into the system, which then detected the beingness of AI developer tools similar Claude and Gemini and hijacked them to autonomously scan the strategy for invaluable data.  The onslaught compromised thousands of developer tokens and keys, giving attackers entree to backstage GitHub repositories.  

Luttwak says that contempt the threats, this has been an breathtaking clip to beryllium a person successful cybersecurity. Wiz, founded successful 2020, was primitively focused connected helping organizations place and code misconfigurations, vulnerabilities, and different information risks crossed unreality environments.  

Over the past year, Wiz has expanded its capabilities to support up with the velocity of AI-related attacks — and to usage AI for its ain products.  

Last September, Wiz launched Wiz Code that focuses connected securing the bundle improvement lifecycle by identifying and mitigating information issues aboriginal successful the improvement process, truthful companies tin beryllium “secure by design.” In April, Wiz launched Wiz Defend, which offers runtime extortion by detecting and responding to progressive threats wrong unreality environments.  

Luttwak said that it’s captious for Wiz to afloat recognize the applications of their customers if the startup is going to assistance with what helium calls “horizontal security.” 

“We request to recognize wherefore you’re gathering it … truthful I tin physique the information instrumentality that nary 1 has ever had before, the information instrumentality that understands you,” helium said. 

‘From time one, you request to person a CISO’ 

The democratization of AI tools has resulted successful a flood of caller startups promising to lick endeavor symptom points. But Luttwak says enterprises shouldn’t conscionable nonstop each of their company, employee, and lawsuit information to “every tiny SaaS institution that has 5 employees conscionable due to the fact that they say, ‘Give maine each your data, and I volition springiness you astonishing AI insights.’” 

Of course, those startups request that information if their offering is going to person immoderate value. Luttwak says that means it’s incumbent upon them to marque definite they’re operating similar a unafraid enactment from the start.  

“From time one, you request to deliberation astir information and compliance,” helium said. “From time one, you request to person a CISO (chief accusation information officer). Even if you person 5 people.” 

Before penning a azygous enactment of code, startups should deliberation similar a highly unafraid organization, helium said. They request to see endeavor information features, audit logs, authentication, entree to production, improvement practices, information ownership, and azygous sign-on. Planning this mode from the commencement means you won’t person to overhaul processes aboriginal and incur what Luttwak calls “security debt.” And if you purpose to merchantability to enterprises, you’ll already beryllium prepared to support their data. 

“We were SOC2 compliant [a compliance framework] earlier we had code,” helium said. “And I tin archer you a secret. Getting SOC2 compliance for 5 employees is overmuch easier than for 500 employees.” 

The adjacent astir important measurement for startups is to deliberation astir architecture, helium said.  

“If you’re an AI startup that wants to absorption connected endeavor from time one, you have to think astir an architecture that allows the information of the lawsuit to enactment … successful the lawsuit environment.” 

For cybersecurity startups looking to measurement into the tract successful the property of AI, Luttwak says now’s the time. Everything from phishing extortion and email information to malware and endpoint extortion is fertile crushed for innovation ‚ some for attackers and defenders. The aforesaid is existent for startups that could assistance with workflow and automation tools to bash “vibe security,” since galore information teams inactive don’t cognize however to usage AI to support against AI. 

“The crippled is open,” Luttwak said. “If each country of information present has caller attacks, past it means we person to rethink each portion of security.” 

Read Entire Article