Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZAST.AI Secures M to Enhance AI-Driven Code Security

ZAST.AI Secures $6M to Enhance AI-Driven Code Security

Posted on February 10, 2026 By CWS

On January 5, 2026, in Seattle, USA, ZAST.AI announced the successful acquisition of $6 million in Pre-A funding. This investment, led by Hillhouse Capital, brings the company’s total funding to nearly $10 million. The infusion of capital underscores the growing recognition of ZAST.AI’s innovative approach to reducing false positives in security alerts, making each alert actionable and reliable.

Groundbreaking Discoveries in Code Security

Last year, ZAST.AI made significant strides in the cybersecurity arena by identifying hundreds of zero-day vulnerabilities across numerous popular open-source projects. These discoveries, submitted through platforms like VulDB, resulted in 119 CVE assignments. The vulnerabilities spanned production-grade codebases supporting global operations, including major projects like Microsoft Azure SDK, Apache Struts XWork, and Alibaba Nacos. Notably, these vulnerabilities came with executable Proof-of-Concept (PoC) evidence, prompting swift action from maintainers of these projects to patch the identified issues.

Innovative AI Technology for Deep Code Analysis

ZAST.AI’s technical edge lies in its “Automated POC Generation + Automated Validation” framework. Unlike conventional static analysis tools, ZAST.AI utilizes advanced AI to conduct comprehensive code analysis. This process not only automates the generation of PoC code for vulnerabilities but also verifies the effectiveness of the PoC in triggering these vulnerabilities. The outcome is a report that focuses solely on verified vulnerabilities, achieving an unprecedented “zero false positive” rate.

Hillhouse Capital acknowledged the importance of this technology, stating that ZAST.AI has transformed vulnerability validation from assessing potential risks to confirming actual vulnerabilities with PoC evidence. This shift significantly enhances the effectiveness of security tools in the industry.

Expanding Capabilities and Future Vision

ZAST.AI’s capabilities extend beyond identifying “syntax-level” vulnerabilities such as SQL Injection and XSS. The company also addresses more elusive “semantic-level” vulnerabilities, including business logic flaws like IDOR and privilege escalation. This comprehensive coverage marks a significant advancement in automated security solutions, addressing a long-standing challenge in the field.

Currently, ZAST.AI provides services to various enterprise clients, including Fortune Global 500 companies. By delivering PoC-backed vulnerability reports, the company helps clients swiftly mitigate vulnerabilities, reducing security operation costs and gaining customer trust. The recent funding will fuel further research and development, product enhancements, and international market expansion. CEO Geng Yang envisions building a holistic AI-driven security platform that offers top-tier security at minimal cost, continuing to innovate in AI and security integration.

For more insights and updates, follow us on Google News, Twitter, and LinkedIn.

The Hacker News Tags:AI security, code vulnerabilities, CVE, Funding, Hillhouse Capital, PoC, Software Security, vulnerability validation, ZAST.AI, zero false positives

Post navigation

Previous Post: Fancy Bear Targets Microsoft Vulnerability in Cyberattack
Next Post: SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

Related Posts

Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software The Hacker News
AI Agents Act Like Employees With Root Access—Here’s How to Regain Control AI Agents Act Like Employees With Root Access—Here’s How to Regain Control The Hacker News
CISO’s Guide To Web Privacy Validation And Why It’s Important CISO’s Guide To Web Privacy Validation And Why It’s Important The Hacker News
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros The Hacker News
FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks The Hacker News
Why Organizations Are Abandoning Static Secrets for Managed Identities Why Organizations Are Abandoning Static Secrets for Managed Identities The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark