{"id":23289,"date":"2026-03-06T14:16:18","date_gmt":"2026-03-06T05:16:18","guid":{"rendered":"https:\/\/aireviewirush.com\/?p=23289"},"modified":"2026-03-06T14:16:18","modified_gmt":"2026-03-06T05:16:18","slug":"a-retrospective-on-workload-safety","status":"publish","type":"post","link":"https:\/\/aireviewirush.com\/?p=23289","title":{"rendered":"A Retrospective on Workload Safety"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><em>Half 1: How a cloud-native malware framework constructed by AI in beneath every week uncovered the following nice blind spot in enterprise safety<\/em><\/p>\n<p>In\u00a0December 2025,\u00a0<a href=\"https:\/\/research.checkpoint.com\/2026\/voidlink-the-cloud-native-malware-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\">Verify Level Analysis<\/a>\u00a0disclosed\u00a0one thing that ought to have set off alarms in each CISO\u2019s workplace:\u00a0<strong>VoidLink<\/strong>, a classy malware framework, purpose-built for long-term, stealthy persistence inside Linux-based cloud and container environments. Not tailored from Home windows malware. Not a repurposed penetration testing device. A cloud-first, Kubernetes-aware implant designed to detect whether or not\u00a0it\u2019s\u00a0working on AWS, GCP, Azure, Alibaba, or Tencent,\u00a0decide\u00a0whether or not it\u2019s\u00a0inside a Docker container or Kubernetes pod, and tailor its conduct accordingly.<\/p>\n<p>VoidLink\u00a0is designed for fileless, invisible persistence. It harvests cloud metadata, API credentials, Git tokens, and secrets and techniques,\u00a0representing\u00a0a milestone in adversary sophistication. It evaluates the safety posture of its host\u2014figuring out\u00a0monitoring instruments, endpoint safety, and hardening measures\u2014and adapts, slowing down in well-defended environments,\u00a0working\u00a0freely in poorly monitored ones. It&#8217;s, within the phrases of Verify Level\u2019s researchers, \u201cmuch more superior than typical Linux malware.\u201d<\/p>\n<p><strong>Cisco Talos<\/strong> lately<strong>\u00a0<\/strong><a href=\"https:\/\/blog.talosintelligence.com\/voidlink\/\" target=\"_blank\" rel=\"noreferrer noopener\">printed<\/a><strong>\u00a0<\/strong>an evaluation revealing that a complicated risk actor it tracks had been actively leveraging\u00a0VoidLink\u00a0in actual campaigns,\u00a0primarily concentrating on know-how and monetary organizations. In line with Talos, the actor sometimes features entry by means of pre-obtained credentials or by exploiting frequent enterprise companies then deploys\u00a0VoidLink\u00a0to\u00a0set up\u00a0command-and-control infrastructure, cover their presence, and launch inside reconnaissance.<\/p>\n<p>Notably, Talos highlighted\u00a0VoidLink\u2019s\u202f<strong>compile-on-demand functionality<\/strong>\u202fas laying the muse for AI-enabled assault frameworks that dynamically create instruments for operators,\u00a0calling it a \u201cnear-production-ready proof of idea for an enterprise grade implant administration framework.\u201d<\/p>\n<p>VoidLink\u00a0indicators that adversaries have crossed a threshold\u2014constructing cloud-native, container-aware, AI-accelerated offensive frameworks particularly engineered for the infrastructure that now runs the world\u2019s most respected workloads. And\u00a0it\u2019s\u00a0removed from\u00a0alone.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\" role=\"button\"><label for=\"item-69eb9d68f2360\" ><span class=\"\"><span style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input aria-label=\"Toggle\" aria-label=\"item-69eb9d68f2360\"  type=\"checkbox\" id=\"item-69eb9d68f2360\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/aireviewirush.com\/?p=23289\/#VoidLink_is_the_sign_The_sample_is_the_story\" title=\"VoidLink\u00a0is the sign. The sample is the story.\">VoidLink\u00a0is the sign. The sample is the story.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/aireviewirush.com\/?p=23289\/#How_we_received_right_here_EDR_%E2%86%92_cloud_%E2%86%92_id_%E2%86%92_workloads\" title=\"How\u00a0we received right here:\u00a0EDR\u00a0\u2192\u00a0cloud\u00a0\u2192\u00a0id\u00a0\u2192\u00a0workloads\">How\u00a0we received right here:\u00a0EDR\u00a0\u2192\u00a0cloud\u00a0\u2192\u00a0id\u00a0\u2192\u00a0workloads<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/aireviewirush.com\/?p=23289\/#Runtime_safety_The_lesson_VoidLink_teaches\" title=\"Runtime safety: The lesson\u00a0VoidLink\u00a0teaches\">Runtime safety: The lesson\u00a0VoidLink\u00a0teaches<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/aireviewirush.com\/?p=23289\/#The_blind_spot_most_CISOs_can%E2%80%99t_afford\" title=\"The blind spot most CISOs\u00a0can\u2019t\u00a0afford\">The blind spot most CISOs\u00a0can\u2019t\u00a0afford<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/aireviewirush.com\/?p=23289\/#The_path_ahead\" title=\"The\u00a0path\u00a0ahead\">The\u00a0path\u00a0ahead<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-6e897c7ce2554252e83e6ae8963606b4\" id=\"h-voidlink-nbsp-is-the-signal-the-pattern-is-the-story\" style=\"font-style:normal;font-weight:400\"><span class=\"ez-toc-section\" id=\"VoidLink_is_the_sign_The_sample_is_the_story\"><\/span>VoidLink\u00a0is the sign. The sample is the story.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>VoidLink\u00a0didn\u2019t\u00a0emerge\u00a0in isolation.\u00a0It\u2019s\u00a0essentially the most superior\u00a0recognized\u00a0instance of a broader shift:\u202fadversaries are systematically concentrating on workloads\u2014the containers, pods, AI inference jobs, and microservices working on Kubernetes\u2014as the first assault floor.\u202fThe previous a number of months\u00a0have\u00a0produced a cascade of assaults confirming this trajectory:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Weaponizing AI Infrastructure<\/strong>:\u00a0<a href=\"https:\/\/www.oligo.security\/blog\/shadowray-2-0-attackers-turn-ai-against-itself-in-global-campaign-that-hijacks-ai-into-self-propagating-botnet?\" target=\"_blank\" rel=\"noreferrer noopener\">ShadowRay 2.0<\/a>\u00a0and\u00a0the\u00a0<a href=\"https:\/\/www.f5.com\/labs\/articles\/weekly-threat-bulletin-february-11th-2026?\" target=\"_blank\" rel=\"noreferrer noopener\">TeamPCP Worm<\/a>\u00a0didn\u2019t simply steal information, they turned\u00a0cutting-edge\u00a0AI techniques into weapons. Attackers commandeered huge GPU clusters and Kubernetes environments into self-replicating botnets, exploiting the very frameworks that energy distributed AI. LLM-generated payloads and privileged\u00a0DaemonSets\u00a0allow them to unfold throughout a whole bunch of 1000&#8217;s of servers, remodeling fashionable AI platforms into assault infrastructure.<\/li>\n<li><strong>Collapsing Container Boundaries:\u00a0<\/strong>Vulnerabilities like\u00a0<a href=\"https:\/\/www.wiz.io\/blog\/nvidia-ai-vulnerability-cve-2025-23266-nvidiascape?\" target=\"_blank\" rel=\"noreferrer noopener\">NVIDIAScape<\/a>\u00a0proved simply how fragile our cloud \u201cpartitions\u201d will be. A easy three-line\u00a0Dockerfile\u00a0was sufficient to attain root entry on a number, probably exposing 37% of all cloud environments.\u00a0It\u2019s\u00a0a stark reminder that whereas we fear about futuristic AI threats, the quick hazard is commonly conventional infrastructure flaws within the AI stack.<\/li>\n<li><strong>Exploiting AI Workflows and Fashions:\u00a0\u00a0<\/strong>Attackers are concentrating on\u00a0each workflow platforms and AI provide chains. <a href=\"https:\/\/www.obsidiansecurity.com\/blog\/cve-2025-34291-critical-account-takeover-and-rce-vulnerability-in-the-langflow-ai-agent-workflow-platform?\" target=\"_blank\" rel=\"noreferrer noopener\">LangFlow<\/a>\u00a0RCE allowed distant code execution and account takeover throughout linked techniques, successfully\u00a0a \u201cgrasp key\u201d\u00a0into AI workflows. Malicious\u00a0<a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/zscaler-discovers-vulnerability-keras-models-allowing-arbitrary-file-access?\" target=\"_blank\" rel=\"noreferrer noopener\">Keras<\/a>\u00a0fashions on repositories like Hugging Face\u00a0can execute arbitrary\u00a0code when loaded, creating hidden backdoors in\u00a0AI environments. About 100\u00a0poisoned\u00a0fashions have been\u00a0<a href=\"https:\/\/jfrog.com\/blog\/data-scientists-targeted-by-malicious-hugging-face-ml-models-with-silent-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener\">recognized<\/a>,\u00a0displaying\u00a0that even trusted AI belongings will be weaponized.<\/li>\n<\/ul>\n<p>At DEF CON 33 and Black Hat 2025, this shift dominated the dialog.\u00a0DEF CON\u2019s devoted Kubernetes protection observe mirrored the neighborhood\u2019s recognition that workload\u00a0and AI infrastructure safety\u00a0is\u00a0now the frontline for enterprise protection.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-e7081df58af017a9e4150f6ac45063c9\" id=\"h-how-nbsp-we-got-here-nbsp-edr-nbsp-nbsp-cloud-nbsp-nbsp-identity-nbsp-nbsp-workloads\" style=\"font-style:normal;font-weight:400\"><span class=\"ez-toc-section\" id=\"How_we_received_right_here_EDR_%E2%86%92_cloud_%E2%86%92_id_%E2%86%92_workloads\"><\/span>How\u00a0we received right here:\u00a0EDR\u00a0\u2192\u00a0cloud\u00a0\u2192\u00a0id\u00a0\u2192\u00a0workloads<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The cybersecurity trade has seen this earlier than\u2014the perimeter shifts, and defenders scramble to catch up. EDR gave us endpoint visibility however assumed the factor value defending had a tough drive and an proprietor. The cloud shift broke these assumptions with ephemeral infrastructure and a blast radius measured in misconfigured IAM roles. The id pivot adopted as attackers realized stealing a credential was extra environment friendly than writing an exploit.<\/p>\n<p><strong>Now the perimeter has shifted once more.<\/strong>\u202fKubernetes has gained\u202fbecause the working layer for contemporary infrastructure\u2014from microservices to GPU-accelerated AI coaching and inference. AI workloads are uniquely priceless targets: proprietary fashions, coaching datasets, API keys, expensive GPU\u00a0compute, and sometimes the core aggressive asset of the group. New clusters face their first assault probe inside 18 minutes. In line with\u00a0<a href=\"https:\/\/www.redhat.com\/tracks\/_pfcdn\/assets\/10330\/contents\/646381\/001b54d3-7c21-417b-995c-ebe7be8328a1.pdf?\" target=\"_blank\" rel=\"noreferrer noopener\">RedHat<\/a>,\u00a0practically ninety p.c\u00a0of organizations skilled not less than one Kubernetes safety incident up to now 12 months. Container-based lateral motion <a href=\"https:\/\/www.tigera.io\/blog\/kubernetes-security-lateral-movement-detection-and-defense\/\" target=\"_blank\" rel=\"noreferrer noopener\">rose 34% in 2025<\/a>.<\/p>\n<p>The workloads are the place the worth is. The adversaries have observed.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-7409de1b47a26a2220537007651eb9b9\" id=\"h-runtime-protection-the-lesson-nbsp-voidlink-nbsp-teaches\" style=\"font-style:normal;font-weight:400\"><span class=\"ez-toc-section\" id=\"Runtime_safety_The_lesson_VoidLink_teaches\"><\/span>Runtime safety: The lesson\u00a0VoidLink\u00a0teaches<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>VoidLink\u00a0exposes a important hole in how most organizations method safety. It targets the \u2018person area\u2019 the place conventional safety brokers dwell. By the point your EDR or CSPM seems to be for a signature, the malware has already encrypted itself and vanished. <strong>It\u00a0isn\u2019t\u00a0simply evading your\u00a0instruments,\u00a0it&#8217;s\u00a0working\u00a0in a layer they can&#8217;t see.<\/strong><\/p>\n<p>That is the place\u202f<strong>runtime safety working on the kernel stage<\/strong>\u202fturns into important\u2014and a strong\u00a0new Linux\u00a0kernel know-how known as\u00a0eBPF\u00a0represents\u00a0a elementary shift in defensive functionality.<\/p>\n<p>Isovalent\u00a0(now a part of Cisco), co-creator and\u00a0open supply\u00a0chief of\u00a0eBPF, constructed the\u00a0Hypershield\u00a0agent on this\u00a0basis.\u00a0Hypershield is an\u00a0eBPF-based safety observability and enforcement layer constructed for Kubernetes. Relatively than counting on user-space brokers, it deploys\u00a0eBPF\u00a0applications throughout the kernel to\u00a0observe\u00a0and implement coverage on course of executions,\u00a0syscalls, file entry, and community exercise in actual time. Critically,\u00a0Hypershield is Kubernetes-identity-aware: it understands namespaces, pods, workload identities, and labels natively, correlating threats with the precise workloads that spawned them.<\/p>\n<p>Isovalent\u2019s<strong>\u00a0<\/strong><a href=\"https:\/\/isovalent.com\/blog\/post\/voidlink-cloud-malware-detection\/\" target=\"_blank\" rel=\"noreferrer noopener\">technical evaluation<\/a>\u00a0demonstrates how Hypershield investigates and mitigates\u00a0VoidLink\u2019s\u00a0conduct at every stage of the kill chain. As a result of it operates\u00a0by means of\u00a0eBPF\u00a0hooks throughout the kernel, it observes\u00a0VoidLink\u2019s\u00a0conduct\u202f<em>regardless<\/em>\u202fof how cleverly the malware evades user-space instruments.\u00a0VoidLink\u2019s\u00a0whole evasion mannequin is designed to defeat brokers\u00a0working\u00a0above the kernel. Hypershield sidesteps it fully.<\/p>\n<p>This precept is the brand new normal for the trendy risk panorama: assaults like\u00a0ShadowRay\u00a02.0 or\u00a0NVIDIAScape\u00a0succeed as a result of conventional defenses\u00a0can\u2019t\u00a0see what workloads are doing in actual time. Runtime visibility and mitigation management on the kernel stage closes that important window between exploitation and detection that attackers depend on.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-4d149bac7fd3fecbfd23efe7fa2b1749\" id=\"h-the-blind-spot-most-cisos-nbsp-can-t-nbsp-afford\" style=\"font-style:normal;font-weight:400\"><span class=\"ez-toc-section\" id=\"The_blind_spot_most_CISOs_can%E2%80%99t_afford\"><\/span>The blind spot most CISOs\u00a0can\u2019t\u00a0afford<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Assaults like\u00a0VoidLink,\u00a0ShadowRay, and\u00a0NVIDIAScape\u00a0make one reality unavoidable:\u202f<strong>most organizations are<\/strong> successfully <strong>blind to Kubernetes<\/strong>, the place AI fashions\u00a0run\u00a0and demanding workloads dwell.<\/p>\n<p>Years of funding in endpoints, id, and cloud monitoring have left Kubernetes\u00a0largely invisible. Treating Kubernetes as a strategic asset, fairly than\u00a0\u201can infrastructure element the platform workforce handles,\u201d provides safety groups the chance\u00a0to\u00a0safeguard\u00a0the crown jewels.<\/p>\n<p>Kubernetes is the place AI lives:\u00a0fashions are educated, inference is served, and brokers should\u00a0function\u00a0repeatedly, now not tied to the lifecycle of laptops.\u00a0The CISO\u2019s position can be evolving, too, shifting from simply securing the perimeter, however the connective tissue between high-velocity DevOps groups constructing the long run and the stakeholders who want assurance that\u00a0the long run is protected.<\/p>\n<p>Kernel-level runtime safety offers the real-time \u201csupply of reality.\u201d Malware can evade user-space instruments, however it can not cover from the system itself. Platforms like Hypershield give CISOs the identical ground-truth visibility within the kernel\u00a0they\u2019ve\u00a0had on endpoints for many years\u2014so groups can see and reply in actual time, with zero overhead.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-8dd255668da6fc252d01bd4bd51af231\" id=\"h-the-nbsp-path-nbsp-forward\" style=\"font-style:normal;font-weight:400\"><span class=\"ez-toc-section\" id=\"The_path_ahead\"><\/span>The\u00a0path\u00a0ahead<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The\u00a0path ahead isn&#8217;t sophisticated, however it requires deliberate prioritization:<\/p>\n<ul class=\"wp-block-list\">\n<li>Deal with Kubernetes and AI workloads as first-class safety belongings.<\/li>\n<li>Deploy runtime safety that gives kernel-level, real-time visibility.<\/li>\n<li>Combine workload monitoring into SOC workflows to detect and reply confidently.<\/li>\n<\/ul>\n<p>Cisco has led innovation in workload safety, leveraging\u00a0Hypershield\u00a0along with Splunk for monitoring and runtime safety for important workloads.<\/p>\n<p>The battlefield has shifted. Adversaries have invested in constructing cloud-native, container-aware,\u00a0AI-accelerated offensive capabilities particularly engineered for the infrastructure that now runs the world\u2019s most respected workloads. The query for each group is whether or not\u00a0their defenses have stored tempo.<\/p>\n<p>The proof from the previous twelve months suggests most haven&#8217;t. The proof from the following twelve will replicate the selections made as we speak.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p class=\"has-text-align-center\" id=\"block-a1b11bef-8542-478b-95c4-6b43d582001b\"><em>We\u2019d love to listen to what you suppose! Ask a query and keep linked with Cisco Safety on social media.<\/em><\/p>\n<p class=\"has-text-align-center\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-cisco-green-color\">Cisco Safety Social Media<\/mark><\/strong><\/p>\n<p class=\"has-text-align-center\" id=\"block-85b5e58a-7e0a-4b88-a1bd-54a5f658e51f\"><a href=\"https:\/\/www.linkedin.com\/showcase\/cisco-secure\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a><br \/><a href=\"https:\/\/www.facebook.com\/ciscosecure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fb<\/a><br \/><a href=\"https:\/\/www.instagram.com\/Ciscosecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a><\/p>\n<\/p><\/div>\n<p><script async defer src=\"https:\/\/platform.instagram.com\/en_US\/embeds.js\"><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Half 1: How a cloud-native malware framework constructed by AI in beneath every week uncovered the following nice blind spot in enterprise safety In\u00a0December 2025,\u00a0Verify Level Analysis\u00a0disclosed\u00a0one thing that ought to have set off alarms in each CISO\u2019s workplace:\u00a0VoidLink, a classy malware framework, purpose-built for long-term, stealthy persistence inside Linux-based cloud and container environments. Not [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23291,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":{"0":"post-23289","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud-computing"},"_links":{"self":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/23289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=23289"}],"version-history":[{"count":1,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/23289\/revisions"}],"predecessor-version":[{"id":23290,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/23289\/revisions\/23290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/media\/23291"}],"wp:attachment":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=23289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=23289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=23289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}