Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rein Security Emerges From Stealth With $8M, Bringing Inside-Out AppSec Approach

Posted on January 28, 2026January 28, 2026 By CWS

Securing manufacturing purposes from the within – Rein Safety presents a brand new method to software safety.

Rein Safety has emerged from stealth with $8 million funding and backing from Glilot Capital. Rein, co-headquartered in Tel Aviv and New York Metropolis, was based by Matan Bar Efrat (CEO) and Netanel Rubin (CTO) in 2024.

The agency is introducing a expertise that successfully protects purposes from the within whereas they’re working.

Each co-founders have labored in cybersecurity (extra particularly software safety) since they had been 18 – though Rubin was a pentester for banks at age 15, earlier than doing navy service as a safety researcher for the Israeli Navy Intelligence.

Whereas contemplating their subsequent steps, Bar Efrat requested Rubin, ‘Why have you ever at all times been capable of hack net servers so simply?’ Rubin’s reply finally comes right down to a visibility hole into the context of an software in manufacturing. Most current AppSec instruments cease at code scanning and pre-production testing. This surfaces points however fails to point out how purposes really behave as soon as they’re in manufacturing.

The 2 determined to sort out this situation, and developed a patent-pending platform expertise that guarantees real-time context and safety inside software manufacturing environments. The response pace obtainable from throughout the app, in detecting and responding to one thing that shouldn’t be occurring, will change into more and more necessary and pressing because the pace and scale of AI-assisted and vibe-coded malicious assaults continues to develop.Commercial. Scroll to proceed studying.

Bar Efrat explains the present difficulties in relation to an agentic AI software. Firstly, conventional guardrails round prompts are laborious. The immediate may very well be a one-liner, a doc or an image, all presumably with hidden malicious immediate content material. A much bigger drawback is that the appliance itself is non-deterministic; by definition it’s probabilistic. “The one manner to supply safety right here is to be as dynamic because the agentic software itself,” he says.

“We based Rein to offer CISOs and AppSec leaders the power to guard each app, MCP, library and API with out disruption. By seeing and controlling precisely what occurs to apps in manufacturing, groups can resolve actual points in actual time quite than spend extreme time on investigation and evaluation.” 

To sort out the issue, Rein has developed a brand new expertise that provides a single line of code to the appliance. In lower than a day, the platform baselines regular or acceptable conduct for the app. If it sees any deviation from the anticipated norm, it points an alert and prevents the deviation.

“For instance, if now we have a library or a perform that often does one factor however instantly executes an RCE or Log4J, we detect that deviation that shouldn’t be occurring on this context, and we return permission denied,” explains Bar Efrat. 

“From the consumer perspective, or from the runtime perspective, we’re not doing something intrusive. We’re not terminating the method. We’re not terminating the thread. We’re not even terminating the HTTP request. We solely micro sandbox the malicious useful resource that’s now being accessed – in different phrases, the exploitation itself. It’s a non-intrusive strategy to forestall assaults from occurring.”

Rein claims runtime safety throughout each zero days and one days through an structure that applies manufacturing context with underneath one millisecond of efficiency impression and no reliance on proxies, sampling or eBPF.

Alexei Balaganski, lead analyst at KuppingerCole Analysts feedback, “Enhancing visibility into actual execution context in manufacturing introduces a unique mind-set about software danger. That perspective will help safety groups prioritize danger, cut back friction, and adapt safety practices to fashionable software program improvement.”

Associated: Bugcrowd Acquires Software Safety Agency Mayhem

Associated: No Safety Scrutiny for Half of Main Code Modifications: AppSec Survey

Associated: Ox Safety Luggage $60M Collection B to Deal with Appsec Alert Fatigue

Security Week News Tags:Approach, Appsec, Bringing, Emerges, InsideOut, Rein, Security, Stealth

Post navigation

Previous Post: Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Next Post: SoundCloud Data Breach Exposes 29.8 Million Personal users Details

Related Posts

Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US Security Week News
Nevada State Offices Closed Following Disruptive Cyberattack Security Week News
Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet Security Week News
Senate Committee Advances Trump Nominee to Lead CISA Security Week News
Train Hack Gets Proper Attention After 20 Years: Researcher  Security Week News
Ransomware Payments Surpassed $4.5 Billion: US Treasury Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark