
Tracking an evolving Discord-based RAT family
RL's research team analyzed four STD Group-operated RATs, which yielded file indicators to better detect the malware, plus two YARA rules.
Code signing is a cryptographic process that digitally signs software, scripts, and executables to verify their authenticity and integrity. It assures users that the code comes from a trusted source and has not been altered or tampered with since it was signed.
Code signing uses public key infrastructure (PKI) to bind a digital certificate to a software artifact, enabling systems to validate the publisher and the trustworthiness of the code.
Unsigned or tampered software poses significant security risks, including malware injection, supply chain compromise, and loss of trust. Code signing:
Operating systems, browsers, and mobile app stores often block or flag unsigned code, making code signing essential for a smooth user experience and distribution.
Platforms like Windows, macOS, Android, and browsers (e.g., Chrome, Firefox) use code signing to assess software trustworthiness.
Term | Focus Area | Key Difference from Code Signing |
|---|---|---|
TLS/SSL Certificates | Secure communication | Used for securing web traffic, not software artifacts. |
Encryption | Confidentiality | Code signing ensures authenticity and integrity, not secrecy. |
Hashing | Data integrity | Code signing builds on hashing with identity verification. |
SBOM | Software inventory | SBOM shows components; code signing ensures their origin and trust. |

RL's research team analyzed four STD Group-operated RATs, which yielded file indicators to better detect the malware, plus two YARA rules.

While 2FA and trusted publishing help, you need visibility into how packages behave — not just who is publishing.

Use of AI in container workloads is growing — but security is not native. That makes additional controls essential. Here’s what you need to know.