Futures
Hundreds of contracts settled in USDT or BTC
TradFi
Gold
Trade global traditional assets with USDT in one place
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Participate in events to win generous rewards
Demo Trading
Use virtual funds to experience risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and enjoy airdrop rewards!
Futures Points
Earn futures points and claim airdrop rewards
Investment
Simple Earn
Earn interests with idle tokens
Auto-Invest
Auto-invest on a regular basis
Dual Investment
Buy low and sell high to take profits from price fluctuations
Soft Staking
Earn rewards with flexible staking
Crypto Loan
0 Fees
Pledge one crypto to borrow another
Lending Center
One-stop lending hub
VIP Wealth Hub
Customized wealth management empowers your assets growth
Private Wealth Management
Customized asset management to grow your digital assets
Quant Fund
Top asset management team helps you profit without hassle
Staking
Stake cryptos to earn in PoS products
Smart Leverage
New
No forced liquidation before maturity, worry-free leveraged gains
GUSD Minting
Use USDT/USDC to mint GUSD for treasury-level yields
How Ami Luttwak Sees AI Reshaping Cybersecurity Threats and Enterprise Defense
Cybersecurity has always been fundamentally about understanding human behavior and intent. Yet as artificial intelligence accelerates through enterprise systems, the attack surface expands dramatically. This is the core insight from Ami Luttwak, chief technologist at Wiz, who recently shared his observations with TechCrunch on how the AI revolution is redefining both offensive and defensive security strategies. For organizations racing to integrate AI into their operations—whether through machine learning agents, automated code generation, or new productivity tools—the security implications are escalating faster than many anticipated.
The paradox is striking: while AI dramatically improves development velocity, that same speed often introduces blind spots. According to experiments conducted by Wiz, a cybersecurity company acquired by Google in 2026, authentication mechanisms emerge as surprisingly common vulnerabilities in AI-assisted development environments. “The reason is straightforward,” Ami Luttwak explained. “When developers rely on AI agents, the default output prioritizes functionality over security unless explicitly instructed otherwise.” This creates a fundamental tension—organizations want the productivity gains from AI-driven development, but the cost can be undermined security practices if not carefully managed.
The Acceleration Paradox: Why Speed Creates Vulnerability
The speed-security tradeoff becomes even more critical when considering that attackers themselves are weaponizing AI. They’re not simply using AI agents for faster code generation; they’re crafting targeted prompts designed to bypass security measures. “Attackers now actively interact with your AI tools, commanding them to reveal sensitive data, erase systems, or execute malicious operations,” Ami Luttwak noted. This represents a fundamental shift—the same automation that benefits defenders now amplifies attackers’ capabilities.
The implications became stark earlier this year when Drift, a provider of AI-powered chatbots for enterprise sales teams, suffered a significant breach. Attackers extracted digital credentials, used them to mimic the chatbot interface, and gained lateral movement within customer systems. The compromised data included sensitive information from hundreds of enterprise clients including Cloudflare, Palo Alto Networks, and Google. Remarkably, the malicious code injected into these systems was itself generated using AI techniques—a meta-threat that underscores how automation now weaponizes both sides of the security equation.
Supply chain vulnerabilities amplify these risks. When third-party AI services have broad access to enterprise systems, a single compromise can cascade across dozens of organizations. This dynamic played out in the “s1ingularity” incident affecting Nx, a widely-used JavaScript build system. Attackers embedded malware designed to detect developer AI tools like Claude and Gemini, then commandeered them to autonomously extract sensitive tokens and encryption keys. The breach exposed thousands of developer credentials, granting attackers access to private code repositories and internal systems.
Real-World Supply Chain Attacks: From Drift to Developer Tools
According to Ami Luttwak’s assessment, these aren’t isolated incidents. Wiz observes weekly attacks targeting thousands of enterprise clients, even though less than 1% of enterprises have fully deployed AI tools. “If you trace any modern attack sequence, you’ll find AI played a role at every phase—reconnaissance, exploitation, persistence, and lateral movement,” he explained. This suggests the AI security threat landscape is advancing at an unprecedented pace, forcing the industry to accelerate defensive innovation accordingly.
Wiz itself has been evolving its product portfolio to address these emerging threats. In early 2026, the company launched Wiz Code, designed to integrate security directly into the software development lifecycle by catching vulnerabilities before code reaches production. The “secure by design” approach represents a philosophical shift—security as a prerequisite rather than an afterthought. Earlier in 2025, Wiz rolled out Wiz Defend, offering real-time threat detection and response capabilities specifically engineered for cloud environments where AI-driven workloads increasingly operate.
Delivering what Ami Luttwak calls “horizontal security” requires deep understanding of each client’s unique technology stack and business logic. “We must comprehend not just what you built, but why you built it that way. Only then can we create genuinely aligned security solutions rather than generic tools,” he explained.
Building Secure From Day One: What Startups Must Know
As AI tools proliferate, so too have startup claims about solving enterprise security challenges. But Ami Luttwak cautions against a common mistake: handing sensitive business and customer data to early-stage SaaS vendors simply because they promise AI-driven insights. The responsibility cuts both ways—while data access enables AI functionality, vendors bear the burden of operating securely from inception.
For new security companies targeting enterprises, Ami Luttwak advocates a counterintuitive strategy: implement enterprise-grade security practices before writing production code. This means establishing audit trails, multi-factor authentication, role-based access controls, compliance frameworks, and formal security protocols from day one—even for five-person teams. “Security and compliance must be architectural priorities, not retrofit additions,” he stressed.
Wiz itself exemplifies this principle. The company achieved SOC2 Type II compliance—a rigorous security certification—before launching its first product. “The optimal time to achieve compliance is with a small team. It becomes exponentially more complex with hundreds of employees,” Ami Luttwak noted. This early investment prevents accumulated “security debt” and accelerates enterprise sales cycles later.
System architecture deserves equal attention. For AI-native startups serving enterprise clients, data isolation becomes critical. “Your architecture must ensure customer data remains within their own environments, never pooled with other clients or stored in shared infrastructure,” Luttwak emphasized. This design principle not only strengthens security but also simplifies regulatory compliance across different jurisdictions.
The Cybersecurity Opportunity in the AI Era
Despite the escalating threat landscape, Ami Luttwak sees genuine opportunity. The traditional security domains—phishing defense, email security, malware detection, endpoint protection—remain innovation-rich battlegrounds. These areas will see competition between both attackers and defenders deploying AI techniques. Similarly, “AI-assisted security” tools that help security teams leverage AI for threat detection, response automation, and policy enforcement are still in early stages.
“The field is genuinely open,” Ami Luttwak concluded. “New attack vectors emerge continuously across every security domain. This requires rethinking defense mechanisms at fundamental levels.” For security entrepreneurs and established vendors alike, the AI revolution creates both urgency and opportunity. Those who anticipate threats early, build with security as a core principle, and evolve rapidly will define the next generation of cybersecurity leadership.