/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Cogent Security, which aims to use AI agents to decide which software bugs to remediate, raised a $42M Series A led by Bain, taking its total funding to $53M

Cogent Security has raised a $42 million Series A just six months after launch.  Their bet?  That AI agents can finally fix …

Fortune Lily Mae Lazarus

Discussion

  • @allisonbraley Allison Braley on x
    For our first Outlier Briefing, @vineete_5 sat down with @rak_garg at the announcement of @cogent_security's new $42M. The vulnerabilities can no longer be managed. Action must be taken and action requires context. Longer video and Fortune exclusive e in comments.
  • @baincapvc @baincapvc on x
    Cogent Security is building autonomous AI agents to replace broken vulnerability management with machine-speed defense. That's why we're proud to lead their $42M Series A round. Co-Founders Vineet Edupuganti, Geng Sng, and Thanos Baskous are building autonomous agents that close …
  • @enriquesalem Enrique Salem on x
    Today we're announcing our lead investment in @cogent_security's Series A. Vulnerability management used to be artisan work. Now, at today's scale, it's overwhelming. Cogent is building an AI-native approach — combining security-specific embeddings, frontier models, and agents