
Tracking an evolving Discord-based RAT family
RL's research team analyzed four STD Group-operated RATs, which yielded file indicators to better detect the malware, plus two YARA rules.
Runtime software verification is the process of validating the integrity, behavior, and security posture of software while it is actively running in production or pre-production environments. Unlike static testing or pre-deployment checks, runtime verification continuously monitors how software behaves under real-world conditions to detect anomalies, unauthorized changes, or malicious activity.
It ensures that deployed applications remain trustworthy and compliant throughout their operational lifecycle.
Even after rigorous pre-deployment testing, software can be compromised at runtime due to:
Runtime verification:
This is especially critical in regulated environments, Zero Trust architectures, and for mission-critical software systems.
Runtime verification typically involves:
This can be implemented through technologies like Runtime Application Self-Protection (RASP), eBPF-based sensors, endpoint detection agents, or kernel-level monitoring tools.
Practice | Focus Area | Key Differences |
|---|---|---|
Static Analysis | Source or binary review | Runtime verification observes live behavior, not code structure |
CI/CD Scanning | Pre-deployment protection | Runtime verification validates software post-deployment |
SIEM/XDR | Log correlation and alerts | Runtime verification is application- or process-level |

RL's research team analyzed four STD Group-operated RATs, which yielded file indicators to better detect the malware, plus two YARA rules.

While 2FA and trusted publishing help, you need visibility into how packages behave — not just who is publishing.

Use of AI in container workloads is growing — but security is not native. That makes additional controls essential. Here’s what you need to know.