BitcoinWorld Crucial AI Cybersecurity: Wiz’s Ami Luttwak Unveils Transformative Cyberattack Strategies In the rapidly evolving digital landscape, where blockchain and cryptocurrency innovations often take center stage, the foundational security of our interconnected systems is more critical than ever. As AI permeates every facet of technology, from finance to enterprise operations, a new frontier of risks and defenses is emerging. Ami Luttwak, the chief technologist at cybersecurity powerhouse Wiz, offers a sobering yet insightful perspective on this transformation. He emphasizes that cybersecurity is fundamentally a ‘mind game’ – a constant strategic battle where new technological waves, like AI, inevitably create fresh opportunities for attackers. For those in the crypto space, understanding these evolving threats is paramount, as the integrity of digital assets relies heavily on robust underlying security. AI Cybersecurity: The Evolving Threat Landscape The integration of Artificial Intelligence into enterprise workflows, whether through ‘vibe coding,’ sophisticated AI agents, or new developer tools, is dramatically expanding the potential attack surface. While AI promises unprecedented speed in development, this velocity often comes at a cost: shortcuts and oversights that create gaping vulnerabilities for malicious actors. Luttwak highlights a critical paradox: the very tools designed to accelerate innovation can inadvertently introduce significant security debt. Wiz, a cybersecurity leader recently acquired by Google for an impressive $32 billion, has been at the forefront of studying these emerging threats. Their recent tests revealed a pervasive issue in AI-generated applications: insecure authentication implementations. Luttwak explains that developers, in their pursuit of speed, often instruct AI agents to build functionality in the easiest way possible, without explicitly demanding the most secure methods. This leads to authentication systems – the gatekeepers verifying user identities – being vulnerable, essentially rolling out the red carpet for attackers. This challenge isn’t confined to development. Attackers are also leveraging AI. They employ ‘vibe coding,’ prompt-based techniques, and their own sophisticated AI agents to craft and launch exploits with alarming efficiency. The days of purely manual hacking are waning; AI is democratizing and amplifying offensive capabilities. Ami Luttwak’s Alarming Insights on Attacker Innovation Ami Luttwak provides a stark warning: attackers are no longer just reacting; they are proactively using AI to their advantage. He notes, “You can actually see the attacker is now using prompts to attack. It’s not just the attacker vibe coding. The attacker looks for AI tools that you have and tells them, ‘Send me all your secrets, delete the machine, delete the file.’” This shift means that AI tools within an organization, intended for efficiency, can be weaponized against it through clever prompting and exploitation. Beyond direct manipulation, attackers are finding new entry points through the very AI tools companies integrate internally to boost efficiency. Luttwak refers to these as “supply chain attacks.” By compromising a third-party service that has extensive access to a company’s infrastructure, attackers can then pivot deeper into corporate systems, creating a domino effect of breaches. A recent high-profile example is the breach of Drift, an AI chatbot startup, which exposed Salesforce data of hundreds of enterprise customers, including industry giants like Cloudflare and Google. The attackers exploited digital keys (tokens) to impersonate the chatbot, query sensitive Salesforce data, and move laterally within customer environments. Luttwak confirmed that the attack code itself was generated using ‘vibe coding,’ underscoring the AI-on-AI nature of modern cyber warfare. Despite the current minimal adoption of AI tools across enterprises — Luttwak estimates around 1% have fully integrated AI — Wiz is already observing thousands of enterprise customers impacted by AI-driven attacks every week. The speed of this revolution, with AI embedded at every step of the attack flow, demands an equally rapid response from the cybersecurity industry. Wiz’s Proactive Stance on Enterprise Security In this dynamic environment, Wiz, founded in 2020, has rapidly evolved its capabilities. Initially focused on identifying and mitigating security risks across cloud environments, Wiz has expanded its offerings to tackle the unique challenges posed by AI-related cyberattacks. Their strategy involves not only defending against AI but also leveraging AI within their own products. In September, Wiz launched Wiz Code, a solution designed to secure the software development lifecycle. It identifies and mitigates security issues early in the development process, promoting a “secure by design” philosophy. Following this, Wiz introduced Wiz Defend in April, offering runtime protection that detects and responds to active threats within cloud environments. This comprehensive approach ensures security from code inception to deployment and ongoing operation. Luttwak emphasizes the importance of “horizontal security,” which requires a deep understanding of customer applications. “We need to understand why you’re building it … so I can build the security tool that no one has ever had before, the security tool that understands you,” he states. This bespoke approach allows Wiz to anticipate and counter novel AI-driven threats effectively. Safeguarding Enterprise Security: Essential Steps for AI Startups The democratization of AI tools has led to a proliferation of new startups promising to solve enterprise pain points. However, Luttwak cautions against indiscriminately sharing sensitive company, employee, and customer data with every nascent SaaS company, regardless of their AI insights. The responsibility lies with these startups to demonstrate robust security from day one. “From day one, you need to think about security and compliance,” Luttwak asserts. “From day one, you need to have a CISO (chief information security officer). Even if you have five people.” This proactive mindset means considering enterprise security features, audit logs, strong authentication, controlled access to production environments, secure development practices, security ownership, and single sign-on before writing a single line of code. Implementing these measures early prevents costly overhauls and “security debt” later on, ensuring readiness to protect enterprise data. Wiz itself exemplifies this commitment, achieving SOC2 compliance — a stringent compliance framework — before their product even had code. Luttwak reveals a key insight: “Getting SOC2 compliance for five employees is much easier than for 500 employees.” Early adoption of security best practices is not just about compliance; it’s a strategic advantage. The next critical step for startups, particularly those focused on AI, is architectural design. “If you’re an AI startup that wants to focus on enterprise from day one, you have to think about an architecture that allows the data of the customer to stay … in the customer environment,” Luttwak advises. This minimizes data exposure and builds trust with enterprise clients. The Future is Open: Opportunities in AI Cybersecurity Despite the formidable threats, Luttwak describes this as an “exciting time to be a leader in cybersecurity.” The landscape of AI cybersecurity is ripe for innovation. Every domain, from phishing protection and email security to malware and endpoint protection, presents fertile ground for both attackers and defenders. Startups focusing on workflow and automation tools for “vibe security” are particularly needed, as many security teams are still grappling with how to leverage AI effectively for defense. “The game is open,” Luttwak concludes. “If every area of security now has new attacks, then it means we have to rethink every part of security.” This challenge presents an unparalleled opportunity for innovators to redefine cybersecurity for the AI age. The transformation of cyberattacks by AI is undeniable, and the urgency for robust defenses has never been greater. Ami Luttwak’s insights from Wiz underscore that while AI presents formidable challenges, it also opens vast new avenues for innovation in cybersecurity. By prioritizing security from the outset, understanding the evolving threat landscape, and embracing proactive solutions, organizations can navigate this new era with confidence, safeguarding their digital future in an increasingly AI-driven world. To learn more about the latest AI cybersecurity trends, explore our article on key developments shaping AI models and institutional adoption. This post Crucial AI Cybersecurity: Wiz’s Ami Luttwak Unveils Transformative Cyberattack Strategies first appeared on BitcoinWorld.BitcoinWorld Crucial AI Cybersecurity: Wiz’s Ami Luttwak Unveils Transformative Cyberattack Strategies In the rapidly evolving digital landscape, where blockchain and cryptocurrency innovations often take center stage, the foundational security of our interconnected systems is more critical than ever. As AI permeates every facet of technology, from finance to enterprise operations, a new frontier of risks and defenses is emerging. Ami Luttwak, the chief technologist at cybersecurity powerhouse Wiz, offers a sobering yet insightful perspective on this transformation. He emphasizes that cybersecurity is fundamentally a ‘mind game’ – a constant strategic battle where new technological waves, like AI, inevitably create fresh opportunities for attackers. For those in the crypto space, understanding these evolving threats is paramount, as the integrity of digital assets relies heavily on robust underlying security. AI Cybersecurity: The Evolving Threat Landscape The integration of Artificial Intelligence into enterprise workflows, whether through ‘vibe coding,’ sophisticated AI agents, or new developer tools, is dramatically expanding the potential attack surface. While AI promises unprecedented speed in development, this velocity often comes at a cost: shortcuts and oversights that create gaping vulnerabilities for malicious actors. Luttwak highlights a critical paradox: the very tools designed to accelerate innovation can inadvertently introduce significant security debt. Wiz, a cybersecurity leader recently acquired by Google for an impressive $32 billion, has been at the forefront of studying these emerging threats. Their recent tests revealed a pervasive issue in AI-generated applications: insecure authentication implementations. Luttwak explains that developers, in their pursuit of speed, often instruct AI agents to build functionality in the easiest way possible, without explicitly demanding the most secure methods. This leads to authentication systems – the gatekeepers verifying user identities – being vulnerable, essentially rolling out the red carpet for attackers. This challenge isn’t confined to development. Attackers are also leveraging AI. They employ ‘vibe coding,’ prompt-based techniques, and their own sophisticated AI agents to craft and launch exploits with alarming efficiency. The days of purely manual hacking are waning; AI is democratizing and amplifying offensive capabilities. Ami Luttwak’s Alarming Insights on Attacker Innovation Ami Luttwak provides a stark warning: attackers are no longer just reacting; they are proactively using AI to their advantage. He notes, “You can actually see the attacker is now using prompts to attack. It’s not just the attacker vibe coding. The attacker looks for AI tools that you have and tells them, ‘Send me all your secrets, delete the machine, delete the file.’” This shift means that AI tools within an organization, intended for efficiency, can be weaponized against it through clever prompting and exploitation. Beyond direct manipulation, attackers are finding new entry points through the very AI tools companies integrate internally to boost efficiency. Luttwak refers to these as “supply chain attacks.” By compromising a third-party service that has extensive access to a company’s infrastructure, attackers can then pivot deeper into corporate systems, creating a domino effect of breaches. A recent high-profile example is the breach of Drift, an AI chatbot startup, which exposed Salesforce data of hundreds of enterprise customers, including industry giants like Cloudflare and Google. The attackers exploited digital keys (tokens) to impersonate the chatbot, query sensitive Salesforce data, and move laterally within customer environments. Luttwak confirmed that the attack code itself was generated using ‘vibe coding,’ underscoring the AI-on-AI nature of modern cyber warfare. Despite the current minimal adoption of AI tools across enterprises — Luttwak estimates around 1% have fully integrated AI — Wiz is already observing thousands of enterprise customers impacted by AI-driven attacks every week. The speed of this revolution, with AI embedded at every step of the attack flow, demands an equally rapid response from the cybersecurity industry. Wiz’s Proactive Stance on Enterprise Security In this dynamic environment, Wiz, founded in 2020, has rapidly evolved its capabilities. Initially focused on identifying and mitigating security risks across cloud environments, Wiz has expanded its offerings to tackle the unique challenges posed by AI-related cyberattacks. Their strategy involves not only defending against AI but also leveraging AI within their own products. In September, Wiz launched Wiz Code, a solution designed to secure the software development lifecycle. It identifies and mitigates security issues early in the development process, promoting a “secure by design” philosophy. Following this, Wiz introduced Wiz Defend in April, offering runtime protection that detects and responds to active threats within cloud environments. This comprehensive approach ensures security from code inception to deployment and ongoing operation. Luttwak emphasizes the importance of “horizontal security,” which requires a deep understanding of customer applications. “We need to understand why you’re building it … so I can build the security tool that no one has ever had before, the security tool that understands you,” he states. This bespoke approach allows Wiz to anticipate and counter novel AI-driven threats effectively. Safeguarding Enterprise Security: Essential Steps for AI Startups The democratization of AI tools has led to a proliferation of new startups promising to solve enterprise pain points. However, Luttwak cautions against indiscriminately sharing sensitive company, employee, and customer data with every nascent SaaS company, regardless of their AI insights. The responsibility lies with these startups to demonstrate robust security from day one. “From day one, you need to think about security and compliance,” Luttwak asserts. “From day one, you need to have a CISO (chief information security officer). Even if you have five people.” This proactive mindset means considering enterprise security features, audit logs, strong authentication, controlled access to production environments, secure development practices, security ownership, and single sign-on before writing a single line of code. Implementing these measures early prevents costly overhauls and “security debt” later on, ensuring readiness to protect enterprise data. Wiz itself exemplifies this commitment, achieving SOC2 compliance — a stringent compliance framework — before their product even had code. Luttwak reveals a key insight: “Getting SOC2 compliance for five employees is much easier than for 500 employees.” Early adoption of security best practices is not just about compliance; it’s a strategic advantage. The next critical step for startups, particularly those focused on AI, is architectural design. “If you’re an AI startup that wants to focus on enterprise from day one, you have to think about an architecture that allows the data of the customer to stay … in the customer environment,” Luttwak advises. This minimizes data exposure and builds trust with enterprise clients. The Future is Open: Opportunities in AI Cybersecurity Despite the formidable threats, Luttwak describes this as an “exciting time to be a leader in cybersecurity.” The landscape of AI cybersecurity is ripe for innovation. Every domain, from phishing protection and email security to malware and endpoint protection, presents fertile ground for both attackers and defenders. Startups focusing on workflow and automation tools for “vibe security” are particularly needed, as many security teams are still grappling with how to leverage AI effectively for defense. “The game is open,” Luttwak concludes. “If every area of security now has new attacks, then it means we have to rethink every part of security.” This challenge presents an unparalleled opportunity for innovators to redefine cybersecurity for the AI age. The transformation of cyberattacks by AI is undeniable, and the urgency for robust defenses has never been greater. Ami Luttwak’s insights from Wiz underscore that while AI presents formidable challenges, it also opens vast new avenues for innovation in cybersecurity. By prioritizing security from the outset, understanding the evolving threat landscape, and embracing proactive solutions, organizations can navigate this new era with confidence, safeguarding their digital future in an increasingly AI-driven world. To learn more about the latest AI cybersecurity trends, explore our article on key developments shaping AI models and institutional adoption. This post Crucial AI Cybersecurity: Wiz’s Ami Luttwak Unveils Transformative Cyberattack Strategies first appeared on BitcoinWorld.

Crucial AI Cybersecurity: Wiz’s Ami Luttwak Unveils Transformative Cyberattack Strategies

2025/09/28 22:25

BitcoinWorld

Crucial AI Cybersecurity: Wiz’s Ami Luttwak Unveils Transformative Cyberattack Strategies

In the rapidly evolving digital landscape, where blockchain and cryptocurrency innovations often take center stage, the foundational security of our interconnected systems is more critical than ever. As AI permeates every facet of technology, from finance to enterprise operations, a new frontier of risks and defenses is emerging. Ami Luttwak, the chief technologist at cybersecurity powerhouse Wiz, offers a sobering yet insightful perspective on this transformation. He emphasizes that cybersecurity is fundamentally a ‘mind game’ – a constant strategic battle where new technological waves, like AI, inevitably create fresh opportunities for attackers. For those in the crypto space, understanding these evolving threats is paramount, as the integrity of digital assets relies heavily on robust underlying security.

AI Cybersecurity: The Evolving Threat Landscape

The integration of Artificial Intelligence into enterprise workflows, whether through ‘vibe coding,’ sophisticated AI agents, or new developer tools, is dramatically expanding the potential attack surface. While AI promises unprecedented speed in development, this velocity often comes at a cost: shortcuts and oversights that create gaping vulnerabilities for malicious actors. Luttwak highlights a critical paradox: the very tools designed to accelerate innovation can inadvertently introduce significant security debt.

Wiz, a cybersecurity leader recently acquired by Google for an impressive $32 billion, has been at the forefront of studying these emerging threats. Their recent tests revealed a pervasive issue in AI-generated applications: insecure authentication implementations. Luttwak explains that developers, in their pursuit of speed, often instruct AI agents to build functionality in the easiest way possible, without explicitly demanding the most secure methods. This leads to authentication systems – the gatekeepers verifying user identities – being vulnerable, essentially rolling out the red carpet for attackers.

This challenge isn’t confined to development. Attackers are also leveraging AI. They employ ‘vibe coding,’ prompt-based techniques, and their own sophisticated AI agents to craft and launch exploits with alarming efficiency. The days of purely manual hacking are waning; AI is democratizing and amplifying offensive capabilities.

Ami Luttwak’s Alarming Insights on Attacker Innovation

Ami Luttwak provides a stark warning: attackers are no longer just reacting; they are proactively using AI to their advantage. He notes, “You can actually see the attacker is now using prompts to attack. It’s not just the attacker vibe coding. The attacker looks for AI tools that you have and tells them, ‘Send me all your secrets, delete the machine, delete the file.’” This shift means that AI tools within an organization, intended for efficiency, can be weaponized against it through clever prompting and exploitation.

Beyond direct manipulation, attackers are finding new entry points through the very AI tools companies integrate internally to boost efficiency. Luttwak refers to these as “supply chain attacks.” By compromising a third-party service that has extensive access to a company’s infrastructure, attackers can then pivot deeper into corporate systems, creating a domino effect of breaches.

A recent high-profile example is the breach of Drift, an AI chatbot startup, which exposed Salesforce data of hundreds of enterprise customers, including industry giants like Cloudflare and Google. The attackers exploited digital keys (tokens) to impersonate the chatbot, query sensitive Salesforce data, and move laterally within customer environments. Luttwak confirmed that the attack code itself was generated using ‘vibe coding,’ underscoring the AI-on-AI nature of modern cyber warfare.

Despite the current minimal adoption of AI tools across enterprises — Luttwak estimates around 1% have fully integrated AI — Wiz is already observing thousands of enterprise customers impacted by AI-driven attacks every week. The speed of this revolution, with AI embedded at every step of the attack flow, demands an equally rapid response from the cybersecurity industry.

Wiz’s Proactive Stance on Enterprise Security

In this dynamic environment, Wiz, founded in 2020, has rapidly evolved its capabilities. Initially focused on identifying and mitigating security risks across cloud environments, Wiz has expanded its offerings to tackle the unique challenges posed by AI-related cyberattacks. Their strategy involves not only defending against AI but also leveraging AI within their own products.

In September, Wiz launched Wiz Code, a solution designed to secure the software development lifecycle. It identifies and mitigates security issues early in the development process, promoting a “secure by design” philosophy. Following this, Wiz introduced Wiz Defend in April, offering runtime protection that detects and responds to active threats within cloud environments. This comprehensive approach ensures security from code inception to deployment and ongoing operation.

Luttwak emphasizes the importance of “horizontal security,” which requires a deep understanding of customer applications. “We need to understand why you’re building it … so I can build the security tool that no one has ever had before, the security tool that understands you,” he states. This bespoke approach allows Wiz to anticipate and counter novel AI-driven threats effectively.

Safeguarding Enterprise Security: Essential Steps for AI Startups

The democratization of AI tools has led to a proliferation of new startups promising to solve enterprise pain points. However, Luttwak cautions against indiscriminately sharing sensitive company, employee, and customer data with every nascent SaaS company, regardless of their AI insights. The responsibility lies with these startups to demonstrate robust security from day one.

“From day one, you need to think about security and compliance,” Luttwak asserts. “From day one, you need to have a CISO (chief information security officer). Even if you have five people.” This proactive mindset means considering enterprise security features, audit logs, strong authentication, controlled access to production environments, secure development practices, security ownership, and single sign-on before writing a single line of code. Implementing these measures early prevents costly overhauls and “security debt” later on, ensuring readiness to protect enterprise data.

Wiz itself exemplifies this commitment, achieving SOC2 compliance — a stringent compliance framework — before their product even had code. Luttwak reveals a key insight: “Getting SOC2 compliance for five employees is much easier than for 500 employees.” Early adoption of security best practices is not just about compliance; it’s a strategic advantage.

The next critical step for startups, particularly those focused on AI, is architectural design. “If you’re an AI startup that wants to focus on enterprise from day one, you have to think about an architecture that allows the data of the customer to stay … in the customer environment,” Luttwak advises. This minimizes data exposure and builds trust with enterprise clients.

The Future is Open: Opportunities in AI Cybersecurity

Despite the formidable threats, Luttwak describes this as an “exciting time to be a leader in cybersecurity.” The landscape of AI cybersecurity is ripe for innovation. Every domain, from phishing protection and email security to malware and endpoint protection, presents fertile ground for both attackers and defenders.

Startups focusing on workflow and automation tools for “vibe security” are particularly needed, as many security teams are still grappling with how to leverage AI effectively for defense. “The game is open,” Luttwak concludes. “If every area of security now has new attacks, then it means we have to rethink every part of security.” This challenge presents an unparalleled opportunity for innovators to redefine cybersecurity for the AI age.

The transformation of cyberattacks by AI is undeniable, and the urgency for robust defenses has never been greater. Ami Luttwak’s insights from Wiz underscore that while AI presents formidable challenges, it also opens vast new avenues for innovation in cybersecurity. By prioritizing security from the outset, understanding the evolving threat landscape, and embracing proactive solutions, organizations can navigate this new era with confidence, safeguarding their digital future in an increasingly AI-driven world.

To learn more about the latest AI cybersecurity trends, explore our article on key developments shaping AI models and institutional adoption.

This post Crucial AI Cybersecurity: Wiz’s Ami Luttwak Unveils Transformative Cyberattack Strategies first appeared on BitcoinWorld.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

On-chain fee report for the first half of 2025: 1,124 protocols achieved profitability, with revenue exceeding $20 billion.

On-chain fee report for the first half of 2025: 1,124 protocols achieved profitability, with revenue exceeding $20 billion.

Author: 1kx network Compiled by: Tim, PANews 1kx has released its most comprehensive on-chain revenue report to date for the crypto market: the "1kx On-Chain Revenue Report (First Half of 2025)". The report compiles verified on-chain fee data from over 1,200 protocols, clearly depicting user payment paths, value flows, and the core factors driving growth. Why are on-chain fees so important? Because this is the most direct signal of genuine payment demand: On-chain ecosystem = open, global, and has investment value Off-chain ecosystem = restricted, mature Data comparison reveals development trends: on-chain application fees increased by 126% year-on-year, while off-chain fees only increased by 15%. How large is the market? In 2020, on-chain activity was still in the experimental stage, but by 2025 it will have developed into a real-time measurable $20 billion economy. Users are paying for hundreds of application scenarios: transactions, buying and selling, data storage, cross-application collaboration, and we have counted 1,124 protocols that have achieved on-chain profitability this year. How are the fees generated? DeFi remains a core pillar, contributing 63% of total fees, but the industry landscape is rapidly evolving: The wallet business (which surged 260% year-on-year) has transformed the user interface into a profit center. Consumer apps (200% growth) directly monetize user traffic. DePIN (which surged 400%) brings computing power and connectivity services onto the blockchain. Does the on-chain economy truly exist? Although the total cost did not exceed the 2021 peak, the ecological health is stronger than before: At that time, on-chain fees accounted for over 40% of ETH transactions; now, transaction costs have decreased by 86%. The number of profitable agreements increased eightfold. Token holders' dividends hit a record high What are the core driving factors? The asset price determines the on-chain fees denominated in USD, which is in line with expectations, but the following should be noted: Price fluctuations trigger seasonal cycles 21 years later, application costs and valuations show a strong causal relationship (increased costs drive up valuations). The influence of on-chain factors in specific tracks is significant. Who is the winner? The top 20 protocols account for 70% of the total fees, but the rankings change frequently, as no industry can be disrupted as rapidly as the crypto space. The top 5 are: meteora, jito, jupitter, raydium, and solana. A discrepancy exists between expenses and valuation: Although application-based projects dominate expense generation, their market capitalization share has remained almost unchanged. Why is this? The market's valuation logic for application-based projects is similar to that for traditional enterprises: DeFi has a price-to-earnings ratio of about 17 times, while public chains have a valuation as high as 3900 times, which reflects additional narrative value (store of value, national-level infrastructure, etc.). What are the future trends for on-chain fees? Our baseline forecast shows that on-chain fees will exceed $32 billion in 2026, representing a year-on-year increase of 63%, primarily driven by the application layer. RWA, DePIN, wallets, and consumer applications are entering a period of accelerated development, while L1 fees will gradually stabilize as scaling technology continues to advance. Driven by favorable regulations, we believe this marks the beginning of the crypto industry's maturity phase: application scale, fee revenue, and value distribution will eventually advance in tandem. Full version: https://1kx.io/writing/2025-onchain-revenue-report
Share
PANews2025/10/31 16:43
IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

The post IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge! appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 18:00 Discover why BlockDAG’s upcoming Awakening Testnet launch makes it the best crypto to buy today as Story (IP) price jumps to $11.75 and Hyperliquid hits new highs. Recent crypto market numbers show strength but also some limits. The Story (IP) price jump has been sharp, fueled by big buybacks and speculation, yet critics point out that revenue still lags far behind its valuation. The Hyperliquid (HYPE) price looks solid around the mid-$50s after a new all-time high, but questions remain about sustainability once the hype around USDH proposals cools down. So the obvious question is: why chase coins that are either stretched thin or at risk of retracing when you could back a network that’s already proving itself on the ground? That’s where BlockDAG comes in. While other chains are stuck dealing with validator congestion or outages, BlockDAG’s upcoming Awakening Testnet will be stress-testing its EVM-compatible smart chain with real miners before listing. For anyone looking for the best crypto coin to buy, the choice between waiting on fixes or joining live progress feels like an easy one. BlockDAG: Smart Chain Running Before Launch Ethereum continues to wrestle with gas congestion, and Solana is still known for network freezes, yet BlockDAG is already showing a different picture. Its upcoming Awakening Testnet, set to launch on September 25, isn’t just a demo; it’s a live rollout where the chain’s base protocols are being stress-tested with miners connected globally. EVM compatibility is active, account abstraction is built in, and tools like updated vesting contracts and Stratum integration are already functional. Instead of waiting for fixes like other networks, BlockDAG is proving its infrastructure in real time. What makes this even more important is that the technology is operational before the coin even hits exchanges. That…
Share
BitcoinEthereumNews2025/09/18 00:32