Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZAST.AI Secures M to Enhance AI-Driven Code Security

ZAST.AI Secures $6M to Enhance AI-Driven Code Security

Posted on February 10, 2026 By CWS

On January 5, 2026, in Seattle, USA, ZAST.AI announced the successful acquisition of $6 million in Pre-A funding. This investment, led by Hillhouse Capital, brings the company’s total funding to nearly $10 million. The infusion of capital underscores the growing recognition of ZAST.AI’s innovative approach to reducing false positives in security alerts, making each alert actionable and reliable.

Groundbreaking Discoveries in Code Security

Last year, ZAST.AI made significant strides in the cybersecurity arena by identifying hundreds of zero-day vulnerabilities across numerous popular open-source projects. These discoveries, submitted through platforms like VulDB, resulted in 119 CVE assignments. The vulnerabilities spanned production-grade codebases supporting global operations, including major projects like Microsoft Azure SDK, Apache Struts XWork, and Alibaba Nacos. Notably, these vulnerabilities came with executable Proof-of-Concept (PoC) evidence, prompting swift action from maintainers of these projects to patch the identified issues.

Innovative AI Technology for Deep Code Analysis

ZAST.AI’s technical edge lies in its “Automated POC Generation + Automated Validation” framework. Unlike conventional static analysis tools, ZAST.AI utilizes advanced AI to conduct comprehensive code analysis. This process not only automates the generation of PoC code for vulnerabilities but also verifies the effectiveness of the PoC in triggering these vulnerabilities. The outcome is a report that focuses solely on verified vulnerabilities, achieving an unprecedented “zero false positive” rate.

Hillhouse Capital acknowledged the importance of this technology, stating that ZAST.AI has transformed vulnerability validation from assessing potential risks to confirming actual vulnerabilities with PoC evidence. This shift significantly enhances the effectiveness of security tools in the industry.

Expanding Capabilities and Future Vision

ZAST.AI’s capabilities extend beyond identifying “syntax-level” vulnerabilities such as SQL Injection and XSS. The company also addresses more elusive “semantic-level” vulnerabilities, including business logic flaws like IDOR and privilege escalation. This comprehensive coverage marks a significant advancement in automated security solutions, addressing a long-standing challenge in the field.

Currently, ZAST.AI provides services to various enterprise clients, including Fortune Global 500 companies. By delivering PoC-backed vulnerability reports, the company helps clients swiftly mitigate vulnerabilities, reducing security operation costs and gaining customer trust. The recent funding will fuel further research and development, product enhancements, and international market expansion. CEO Geng Yang envisions building a holistic AI-driven security platform that offers top-tier security at minimal cost, continuing to innovate in AI and security integration.

For more insights and updates, follow us on Google News, Twitter, and LinkedIn.

The Hacker News Tags:AI security, code vulnerabilities, CVE, Funding, Hillhouse Capital, PoC, Software Security, vulnerability validation, ZAST.AI, zero false positives

Post navigation

Previous Post: Fancy Bear Targets Microsoft Vulnerability in Cyberattack
Next Post: SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

Related Posts

CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The Hacker News
North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications New TETRA Radio Encryption Flaws Expose Law Enforcement Communications The Hacker News
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI The Hacker News
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News