Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Android Malware Hijacks Google Gemini to Stay Hidden

February 20, 2026

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

February 20, 2026

Dramatic Escalation Frequency and Power of in DDoS Attacks

February 20, 2026
Facebook X (Twitter) Instagram
Friday, February 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code Security
News

ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code Security

Team-CWDBy Team-CWDFebruary 18, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI’s total funding close to $10 million. This marks a recognition from leading capital markets of a new solution: ending the era of high false positive rates in security tools and making every alert genuinely actionable.

In 2025, ZAST.AI discovered hundreds of zero-day vulnerabilities across dozens of popular open-source projects. These findings were submitted through authoritative vulnerability platforms like VulDB, successfully resulting in 119 CVE assignments. These are not laboratory targets, but production-grade code supporting global businesses. Affected well-known projects include widely used components and frameworks such as Microsoft Azure SDK, Apache Struts XWork, Alibaba Nacos, Langfuse, Koa, node-formidable, and others.

It was precisely within these widely adopted open-source projects that ZAST.AI discovered hundreds of real, exploitable vulnerabilities accompanied by executable Proof-of-Concept (PoC) evidence. Maintainers of these projects from top technology companies like Microsoft, Apache, and Alibaba have already patched their code based on the PoCs submitted by ZAST.AI.

“In the traditional field of code security analysis, high false positive rates have long been a core pain point plaguing enterprise security teams. Security engineers often spend significant time manually verifying alerts generated by tools, resulting in extremely low efficiency,” said Geng Yang, Co-founder of ZAST.AI. “‘Report is cheap, show me the POC!’ This was the original intention behind founding ZAST.AI — we believe only verified vulnerabilities are worth reporting.”

ZAST.AI’s core innovation lies in its “Automated POC Generation + Automated Validation” technical architecture. Unlike traditional static analysis tools, ZAST.AI leverages advanced AI technology to perform deep code analysis on applications. It can not only automatically generate Proof-of-Concept (PoC) code for exploiting vulnerabilities but also automatically execute and verify whether the PoC successfully triggers the vulnerability. The final report only presents real vulnerabilities that have been practically verified, achieving a breakthrough “zero false positive” effect.

“This isn’t an optimization—it’s a reconstruction,” said a representative from Hillhouse Capital. “ZAST.AI has redefined the standard for vulnerability validation, shifting from ‘potential risk’ to ‘confirmed vulnerability, here is the PoC.’ This changes the game.”

Regarding vulnerability coverage, ZAST.AI not only supports the detection of “syntax-level” vulnerabilities such as SQL Injection, XSS, Insecure Deserialization, and SSRF but also possesses the capability to identify semantic-level vulnerabilities. This includes complex business logic flaws like IDOR, privilege escalation, and payment logic vulnerabilities—areas long considered difficult for automated tools to reach. Imagine your security tool crying “wolf” every day, with a false positive rate above 60%. By the time the real “wolf” appears, the team might already be desensitized. This isn’t a people problem; it’s a tool defect—they can only speculate, not prove.

Currently, ZAST.AI already serves multiple enterprise clients, including Fortune Global 500 companies. By automatically discovering unknown vulnerabilities and directly providing runnable PoC vulnerability reports, ZAST.AI helps clients significantly shorten vulnerability remediation cycles, markedly reduce security operation costs, and has gained high recognition from customers. This round of funding will primarily be used for core technology R&D, product feature expansion, and global market development. CEO, Geng Yang stated: “Our vision is to build an end-to-end AI-driven security platform, enabling every development team to obtain the highest quality security assurance at the lowest cost. In the future, ZAST.AI will continue to deepen technological innovation in AI + Security, providing global customers with smarter, more precise, and more efficient code security solutions.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleApple Expands RCS Encryption and Memory Protections in iOS 26.4
Next Article Over-Privileged AI Drives 4.5 Times Higher Incident Rates
Team-CWD
  • Website

Related Posts

News

Android Malware Hijacks Google Gemini to Stay Hidden

February 20, 2026
News

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

February 20, 2026
News

Dramatic Escalation Frequency and Power of in DDoS Attacks

February 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Is it OK to let your children post selfies online?

February 17, 2026

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.