Boost Security has announced the acquisitions of SecureIQx and Korbit.ai, paired with $4 million in additional funding from White Star Capital, Amiral Ventures, Accelia Capital, and Sorensen Capital. This move is an obvious reaction to a challenge that is evolving at an alarming rate, faster than any security team can monitor the amount of code being written by AI is increasing dramatically; however, the systems created to scan and protect that code are not capable of doing so because they were not intended for such an extensive process. For those security managers who are working on application security management programs, this merger sends a clear message.
Some reports estimate that there is 15 times the code written in 2025 than in 2024, and it is all written without any human intervention. This has created a huge security hole for applications that cannot be plugged through any existing traditional methods.
What Happened
Boost Security, which is marketing itself as an “AI-Native Software Development Life Cycle (SDLC) Defense Platform,” has made two acquisitions designed to plug critical security gaps.
The two acquisitions bring distinct and complementary capabilities:
- SecureIQx:- An MIT-founded startup that built a Software Composition Analysis reachability engine capable of analyzing both binary and source code across more than a dozen programming languages. The technology determines whether vulnerable components are actually reachable and exploitable in production not just flagged in a dependency list
- Korbit.ai:- An AI-native pull request review platform trained on hundreds of millions of lines of code across thousands of companies, designed to catch security vulnerabilities, performance issues, and coding flaws during the code review stage before they reach production
Together, the acquisitions add advanced reachability analysis, AI-native SAST capabilities, and automated code review into Boost Security‘s unified platform which already spans Developer Endpoint Protection, Software Supply Chain Security, and AI-Native ASPM.
The $4 million in additional funding from White Star Capital, Amiral Ventures, Accelia Capital, and Sorensen Capital supports the integration and continued platform development.
Why This Matters
This acquisition is not just a product story. It reflects a structural break in how software is being built and how catastrophically unprepared most application security programs are for what that means.
The problem with AI coding agents writing code on such a large scale and at a speed beyond the capabilities of manual human verification processes is that there is now an ever-growing attack surface where vulnerabilities are being created far quicker than they can be found and fixed using standard AppSec tools.
Three forces are converging to make this a market-defining moment:
- AI-generated code has broken the economics of manual security review. When 15 times more code is being produced year over year and most of it is not written by humans the assumption that security teams can review, triage, and remediate at pace is no longer viable. The tooling has to operate at machine speed.
- Supply chain attacks are accelerating alongside code volume. More code means more dependencies, more packages, more libraries, and more opportunities for malicious components to enter the development pipeline. The SecureIQx acquisition directly addresses this by determining whether vulnerable components are actually reachable in production reducing noise and prioritizing real risk.
- The security architecture for the AI coding era does not yet exist at scale. Most organizations are trying to apply point solutions designed for human-written code to an environment dominated by AI agents. Platforms built from the ground up to sit outside the AI coding loop intercepting threats before they reach production represent a fundamentally different approach that the market is beginning to recognize and fund.
“Recent high-profile supply chain attacks are just the opening act. The deeper risk is that every engineering team on the planet is now shipping code written by AI agents that can unknowingly introduce vulnerabilities at machine speed and machine scale, and you can’t ask the same agent that wrote the bug to be your last line of defense. Boost is one of the few platforms built from the ground up to sit outside that loop, intercepting threats before they ever reach production. That’s the security architecture this new era demands.” Catherine Ouellet-Dupuis, Partner, White Star Capital
“We’re in a new era. By some estimates, 15 times more code was produced in 2025 than in 2024, and most of it wasn’t written or reviewed by humans. At the same time, supply chain attacks are becoming more frequent and more sophisticated. With these acquisitions, we are bringing deeper agentic capabilities into the Boost Security platform to meet that reality.” Zaid Al Hamami, Founder and CEO, Boost Security
These are not aspirational statements. They are descriptions of a market inflection point that is already happening and a clear signal of where enterprise AppSec investment is heading.
Impact on Buyers
This acquisition creates three immediate pressure points for enterprise security and engineering leaders:
1. Risk Exposure What Is Actually at Stake
Organizations that are adopting AI coding agents without a corresponding upgrade to their application security tooling are accumulating technical debt with a security price tag. Every AI-generated pull request that goes through a review process designed for human-written code is a potential blind spot. Supply chain components pulled in by AI agents and not analyzed for reachability represent vulnerabilities that are flagged but never truly understood in terms of actual production risk.
2. Operational Pressure What AppSec and Engineering Teams Are Facing
Security teams are already overwhelmed by vulnerability volume. AI-based coding does not decrease but increases that number. The imperative to shift from human review and alert-centric AppSec practices to automation and AI-driven systems for detection and remediation is increasing day by day. Engineering teams who release products with the speed of machines cannot tolerate such a bottleneck in security.
3. Budget Implication Where AppSec Spending Is Shifting
This acquisition reflects a consolidation trend that buyers should expect to accelerate. Standalone SCA tools, standalone SAST tools, and standalone code review platforms are being absorbed into unified SDLC security platforms. Security leaders still running fragmented AppSec toolchains will face increasing pressure to evaluate platform consolidation both for coverage reasons and for the operational efficiency gains that unified platforms deliver in high-volume AI coding environments.
Demand Signal
This acquisition is a direct trigger for buying activity in the following categories:
| Category | Why Demand Is Moving Now |
|---|---|
| AI-Native Application Security Posture Management (ASPM) | Traditional ASPM tools were not built for AI-generated code volume platform replacement cycles are accelerating |
| Software Composition Analysis with Reachability | Organizations drowning in SCA alerts need reachability context to prioritize real production risk point SCA tools without this capability are losing ground |
| AI-Native SAST and Automated Code Review | Pull request security at machine speed requires AI-trained detection legacy SAST tools cannot operate at this velocity |
| Software Supply Chain Security | Supply chain attack frequency is increasing alongside AI code adoption unified platform demand is rising |
| SDLC Security Platform Consolidation | Fragmented AppSec tooling is a structural liability in AI coding environments consolidation evaluations will accelerate |
What Security Leaders Should Do
In the Next 30 Days:
- Assess what percentage of code being shipped in your environment is AI-generated and whether your current AppSec tooling was designed to handle it
- Review your current SCA program and determine whether it includes reachability analysis or whether it is producing vulnerability lists without production context
- Evaluate whether your code review process has the capacity to operate at the speed AI coding agents are generating pull requests
Between 30 and 60 Days:
- Begin a structured review of your AppSec toolchain against the AI coding environment you are actually running not the one your tools were purchased for
- Identify where your current SAST and SCA tools are creating bottlenecks for engineering teams and quantify the security coverage gaps those bottlenecks are producing
- Map your software supply chain security posture against the volume of third-party packages and libraries your AI coding agents are pulling in
Between 60 and 90 Days:
- Build a consolidation evaluation framework for SDLC security that prioritizes platforms designed for AI-native development environments
- Establish clear requirements around reachability analysis, automated remediation, and developer endpoint protection as baseline capabilities for any AppSec platform under evaluation
- Align AppSec investment decisions with engineering leadership the security bottleneck problem is as much an engineering velocity problem as it is a risk problem
CyberTech Intelligence POV
At CyberTech Intelligence, this acquisition reflects something the AppSec market has been building toward for the past two years:
The application security stack built for human-written code is structurally mismatched with the AI coding era and the market is beginning to fund the platforms designed to replace it.
Boost Security’s move to acquire reachability analysis and AI-native code review capabilities in a single funding cycle is not a coincidence. It is a response to a demand signal that enterprise buyers are already generating even if they have not yet formalized it into a procurement decision.
Demand is not created. It is triggered by risk, urgency, and market events.
The convergence of AI-generated code volume, accelerating supply chain attacks, and fragmented legacy AppSec tooling is creating one of the clearest 30 to 90 day buying windows in the application security market right now. The vendors and buyers who recognize and move on that signal will be better positioned than those treating this as a product announcement to watch from a distance.
Who Should Care
| Role | Why This Acquisition Is Directly Relevant |
|---|---|
| CISOs | AI-generated code volume is outpacing existing AppSec program capacity platform strategy needs urgent reassessment |
| Security Architects | SDLC security architecture built for human-written code requires redesign for AI-native development environments |
| AppSec and DevSecOps Leaders | Fragmented SCA, SAST, and code review tooling is a liability consolidation evaluation should begin now |
| Engineering and DevOps Leaders | Security bottlenecks built on manual review processes cannot coexist with AI coding agent velocity |
| Procurement and Vendor Risk Teams | Supply chain security requirements for AI coding environments need to be reflected in vendor evaluation criteria |
Identify How This Signal Impacts Your Pipeline
AppSec budgets are shifting right now driven by AI code volume, supply chain attack frequency, and the growing gap between legacy tooling and the environments it is being asked to secure.
See where your pipeline is exposed
As organizations rethink operational efficiency, AI governance, and enterprise-wide risk management, finance and procurement leaders are also turning attention toward intelligent spend visibility and automation.
Discover the key KPIs behind one of the leading platforms for total expense management with native AI.
The Coupa Total Spend Management Benchmark Report delivers actionable insights based on performance data from the broader Coupa community, helping organizations benchmark spend management maturity and operational efficiency.
Note: – This news was originally received and published by CyberTech Media.
Recommended Cyber Technology News :
- Palo Alto Networks Warns of Critical PAN-OS Flaw Allowing Unauthenticated Root Access
- CrowdStrike AI Security Expansion: What It Means for CISOs, AI Risk & Security Budgets
- KnowBe4 AI Security Training Launch: Why CISOs Are Investing in Human Risk Management
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading




