Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZAST.AI Secures M to Enhance AI-Driven Code Security

ZAST.AI Secures $6M to Enhance AI-Driven Code Security

Posted on February 10, 2026 By CWS

On January 5, 2026, in Seattle, USA, ZAST.AI announced the successful acquisition of $6 million in Pre-A funding. This investment, led by Hillhouse Capital, brings the company’s total funding to nearly $10 million. The infusion of capital underscores the growing recognition of ZAST.AI’s innovative approach to reducing false positives in security alerts, making each alert actionable and reliable.

Groundbreaking Discoveries in Code Security

Last year, ZAST.AI made significant strides in the cybersecurity arena by identifying hundreds of zero-day vulnerabilities across numerous popular open-source projects. These discoveries, submitted through platforms like VulDB, resulted in 119 CVE assignments. The vulnerabilities spanned production-grade codebases supporting global operations, including major projects like Microsoft Azure SDK, Apache Struts XWork, and Alibaba Nacos. Notably, these vulnerabilities came with executable Proof-of-Concept (PoC) evidence, prompting swift action from maintainers of these projects to patch the identified issues.

Innovative AI Technology for Deep Code Analysis

ZAST.AI’s technical edge lies in its “Automated POC Generation + Automated Validation” framework. Unlike conventional static analysis tools, ZAST.AI utilizes advanced AI to conduct comprehensive code analysis. This process not only automates the generation of PoC code for vulnerabilities but also verifies the effectiveness of the PoC in triggering these vulnerabilities. The outcome is a report that focuses solely on verified vulnerabilities, achieving an unprecedented “zero false positive” rate.

Hillhouse Capital acknowledged the importance of this technology, stating that ZAST.AI has transformed vulnerability validation from assessing potential risks to confirming actual vulnerabilities with PoC evidence. This shift significantly enhances the effectiveness of security tools in the industry.

Expanding Capabilities and Future Vision

ZAST.AI’s capabilities extend beyond identifying “syntax-level” vulnerabilities such as SQL Injection and XSS. The company also addresses more elusive “semantic-level” vulnerabilities, including business logic flaws like IDOR and privilege escalation. This comprehensive coverage marks a significant advancement in automated security solutions, addressing a long-standing challenge in the field.

Currently, ZAST.AI provides services to various enterprise clients, including Fortune Global 500 companies. By delivering PoC-backed vulnerability reports, the company helps clients swiftly mitigate vulnerabilities, reducing security operation costs and gaining customer trust. The recent funding will fuel further research and development, product enhancements, and international market expansion. CEO Geng Yang envisions building a holistic AI-driven security platform that offers top-tier security at minimal cost, continuing to innovate in AI and security integration.

For more insights and updates, follow us on Google News, Twitter, and LinkedIn.

The Hacker News Tags:AI security, code vulnerabilities, CVE, Funding, Hillhouse Capital, PoC, Software Security, vulnerability validation, ZAST.AI, zero false positives

Post navigation

Previous Post: Fancy Bear Targets Microsoft Vulnerability in Cyberattack
Next Post: SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

Related Posts

Business Case for Agentic AI SOC Analysts Business Case for Agentic AI SOC Analysts The Hacker News
New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks The Hacker News
Password Reuse in Disguise: An Often-Missed Risky Workaround Password Reuse in Disguise: An Often-Missed Risky Workaround The Hacker News
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Hacker News
PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads The Hacker News
n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT36 and SideCopy Target Indian Defense with RATs
  • Prometei Botnet Targets Windows Servers with Advanced Tactics
  • Zast.AI Secures $6 Million for Advanced Code Security
  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT36 and SideCopy Target Indian Defense with RATs
  • Prometei Botnet Targets Windows Servers with Advanced Tactics
  • Zast.AI Secures $6 Million for Advanced Code Security
  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark