Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZAST.AI Secures M to Enhance AI-Driven Code Security

ZAST.AI Secures $6M to Enhance AI-Driven Code Security

Posted on February 10, 2026 By CWS

On January 5, 2026, in Seattle, USA, ZAST.AI announced the successful acquisition of $6 million in Pre-A funding. This investment, led by Hillhouse Capital, brings the company’s total funding to nearly $10 million. The infusion of capital underscores the growing recognition of ZAST.AI’s innovative approach to reducing false positives in security alerts, making each alert actionable and reliable.

Groundbreaking Discoveries in Code Security

Last year, ZAST.AI made significant strides in the cybersecurity arena by identifying hundreds of zero-day vulnerabilities across numerous popular open-source projects. These discoveries, submitted through platforms like VulDB, resulted in 119 CVE assignments. The vulnerabilities spanned production-grade codebases supporting global operations, including major projects like Microsoft Azure SDK, Apache Struts XWork, and Alibaba Nacos. Notably, these vulnerabilities came with executable Proof-of-Concept (PoC) evidence, prompting swift action from maintainers of these projects to patch the identified issues.

Innovative AI Technology for Deep Code Analysis

ZAST.AI’s technical edge lies in its “Automated POC Generation + Automated Validation” framework. Unlike conventional static analysis tools, ZAST.AI utilizes advanced AI to conduct comprehensive code analysis. This process not only automates the generation of PoC code for vulnerabilities but also verifies the effectiveness of the PoC in triggering these vulnerabilities. The outcome is a report that focuses solely on verified vulnerabilities, achieving an unprecedented “zero false positive” rate.

Hillhouse Capital acknowledged the importance of this technology, stating that ZAST.AI has transformed vulnerability validation from assessing potential risks to confirming actual vulnerabilities with PoC evidence. This shift significantly enhances the effectiveness of security tools in the industry.

Expanding Capabilities and Future Vision

ZAST.AI’s capabilities extend beyond identifying “syntax-level” vulnerabilities such as SQL Injection and XSS. The company also addresses more elusive “semantic-level” vulnerabilities, including business logic flaws like IDOR and privilege escalation. This comprehensive coverage marks a significant advancement in automated security solutions, addressing a long-standing challenge in the field.

Currently, ZAST.AI provides services to various enterprise clients, including Fortune Global 500 companies. By delivering PoC-backed vulnerability reports, the company helps clients swiftly mitigate vulnerabilities, reducing security operation costs and gaining customer trust. The recent funding will fuel further research and development, product enhancements, and international market expansion. CEO Geng Yang envisions building a holistic AI-driven security platform that offers top-tier security at minimal cost, continuing to innovate in AI and security integration.

For more insights and updates, follow us on Google News, Twitter, and LinkedIn.

The Hacker News Tags:AI security, code vulnerabilities, CVE, Funding, Hillhouse Capital, PoC, Software Security, vulnerability validation, ZAST.AI, zero false positives

Post navigation

Previous Post: Fancy Bear Targets Microsoft Vulnerability in Cyberattack
Next Post: SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

Related Posts

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) The Hacker News
Why Organizations Are Abandoning Static Secrets for Managed Identities Why Organizations Are Abandoning Static Secrets for Managed Identities The Hacker News
Kickstart Your Intelligent Workflow Program with 3 Key Strategies Kickstart Your Intelligent Workflow Program with 3 Key Strategies The Hacker News
NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems The Hacker News
PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse The Hacker News
Chinese Cyber Threat Targets Southeast Asian Militaries Chinese Cyber Threat Targets Southeast Asian Militaries The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark