{"id":16819,"date":"2026-03-05T13:47:27","date_gmt":"2026-03-05T13:47:27","guid":{"rendered":"https:\/\/dmsretail.com\/RetailNews\/a-retrospective-on-workload-security\/"},"modified":"2026-03-05T13:47:27","modified_gmt":"2026-03-05T13:47:27","slug":"a-retrospective-on-workload-security","status":"publish","type":"post","link":"https:\/\/dmsretail.com\/RetailNews\/a-retrospective-on-workload-security\/","title":{"rendered":"A Retrospective on Workload Security"},"content":{"rendered":"<p> <p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/>\n<\/p>\n<div>\n<p><em>Part 1: How a cloud-native malware framework built by AI in under a week exposed the next great blind spot in enterprise security<\/em><\/p>\n<p>In\u00a0December 2025,\u00a0Check Point Research\u00a0disclosed\u00a0something that should have set off alarms in every CISO\u2019s office:\u00a0<strong>VoidLink<\/strong>, a sophisticated malware framework, purpose-built for long-term, stealthy persistence inside Linux-based cloud and container environments. Not adapted from Windows malware. Not a repurposed penetration testing tool. A cloud-first, Kubernetes-aware implant designed to detect whether\u00a0it\u2019s\u00a0running on AWS, GCP, Azure, Alibaba, or Tencent,\u00a0determine\u00a0whether it\u2019s\u00a0inside a Docker container or Kubernetes pod, and tailor its behavior accordingly.<\/p>\n<p>VoidLink\u00a0is designed for fileless, invisible persistence. It harvests cloud metadata, API credentials, Git tokens, and secrets,\u00a0representing\u00a0a milestone in adversary sophistication. It evaluates the security posture of its host\u2014identifying\u00a0monitoring tools, endpoint protection, and hardening measures\u2014and adapts, slowing down in well-defended environments,\u00a0operating\u00a0freely in poorly monitored ones. It is, in the words of Check Point\u2019s researchers, \u201cfar more advanced than typical Linux malware.\u201d<\/p>\n<p><strong>Cisco Talos<\/strong> recently<strong>\u00a0<\/strong>published<strong>\u00a0<\/strong>an analysis revealing that an advanced threat actor it tracks had been actively leveraging\u00a0VoidLink\u00a0in real campaigns,\u00a0primarily targeting technology and financial organizations. According to Talos, the actor typically gains access through pre-obtained credentials or by exploiting common enterprise services then deploys\u00a0VoidLink\u00a0to\u00a0establish\u00a0command-and-control infrastructure, hide their presence, and launch internal reconnaissance.<\/p>\n<p>Notably, Talos highlighted\u00a0VoidLink\u2019s\u202f<strong>compile-on-demand capability<\/strong>\u202fas laying the foundation for AI-enabled attack frameworks that dynamically create tools for operators,\u00a0calling it a \u201cnear-production-ready proof of concept for an enterprise grade implant management framework.\u201d<\/p>\n<p>VoidLink\u00a0signals that adversaries have crossed a threshold\u2014building cloud-native, container-aware, AI-accelerated offensive frameworks specifically engineered for the infrastructure that now runs the world\u2019s most valuable workloads. And\u00a0it\u2019s\u00a0far from\u00a0alone.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-6e897c7ce2554252e83e6ae8963606b4\" id=\"h-voidlink-nbsp-is-the-signal-the-pattern-is-the-story\" style=\"font-style:normal;font-weight:400\">VoidLink\u00a0is the signal. The pattern is the story.<\/h2>\n<p>VoidLink\u00a0didn\u2019t\u00a0emerge\u00a0in isolation.\u00a0It\u2019s\u00a0the most advanced\u00a0known\u00a0example of a broader shift:\u202fadversaries are systematically targeting workloads\u2014the containers, pods, AI inference jobs, and microservices running on Kubernetes\u2014as the primary attack surface.\u202fThe past several months\u00a0have\u00a0produced a cascade of attacks confirming this trajectory:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Weaponizing AI Infrastructure<\/strong>:\u00a0ShadowRay 2.0\u00a0and\u00a0the\u00a0TeamPCP Worm\u00a0didn\u2019t just steal data, they turned\u00a0cutting-edge\u00a0AI systems into weapons. Attackers commandeered massive GPU clusters and Kubernetes environments into self-replicating botnets, exploiting the very frameworks that power distributed AI. LLM-generated payloads and privileged\u00a0DaemonSets\u00a0let them spread across hundreds of thousands of servers, transforming modern AI platforms into attack infrastructure.<\/li>\n<li><strong>Collapsing Container Boundaries:\u00a0<\/strong>Vulnerabilities like\u00a0NVIDIAScape\u00a0proved just how fragile our cloud \u201cwalls\u201d can be. A simple three-line\u00a0Dockerfile\u00a0was enough to achieve root access on a host, potentially exposing 37% of all cloud environments.\u00a0It\u2019s\u00a0a stark reminder that while we worry about futuristic AI threats, the immediate danger is often traditional infrastructure flaws in the AI stack.<\/li>\n<li><strong>Exploiting AI Workflows and Models:\u00a0\u00a0<\/strong>Attackers are targeting\u00a0both workflow platforms and AI supply chains. LangFlow\u00a0RCE allowed remote code execution and account takeover across connected systems, effectively\u00a0a \u201cmaster key\u201d\u00a0into AI workflows. Malicious\u00a0Keras\u00a0models on repositories like Hugging Face\u00a0can execute arbitrary\u00a0code when loaded, creating hidden backdoors in\u00a0AI environments. About 100\u00a0poisoned\u00a0models have been\u00a0identified,\u00a0showing\u00a0that even trusted AI assets can be weaponized.<\/li>\n<\/ul>\n<p>At DEF CON 33 and Black Hat 2025, this shift dominated the conversation.\u00a0DEF CON\u2019s dedicated Kubernetes defense track reflected the community\u2019s recognition that workload\u00a0and AI infrastructure security\u00a0is\u00a0now the frontline for enterprise defense.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-e7081df58af017a9e4150f6ac45063c9\" id=\"h-how-nbsp-we-got-here-nbsp-edr-nbsp-nbsp-cloud-nbsp-nbsp-identity-nbsp-nbsp-workloads\" style=\"font-style:normal;font-weight:400\">How\u00a0we got here:\u00a0EDR\u00a0\u2192\u00a0cloud\u00a0\u2192\u00a0identity\u00a0\u2192\u00a0workloads<\/h2>\n<p>The cybersecurity industry has seen this before\u2014the perimeter shifts, and defenders scramble to catch up. EDR gave us endpoint visibility but assumed the thing worth protecting had a hard drive and an owner. The cloud shift broke those assumptions with ephemeral infrastructure and a blast radius measured in misconfigured IAM roles. The identity pivot followed as attackers realized stealing a credential was more efficient than writing an exploit.<\/p>\n<p><strong>Now the perimeter has shifted again.<\/strong>\u202fKubernetes has won\u202fas the operating layer for modern infrastructure\u2014from microservices to GPU-accelerated AI training and inference. AI workloads are uniquely valuable targets: proprietary models, training datasets, API keys, costly GPU\u00a0compute, and often the core competitive asset of the organization. New clusters face their first attack probe within 18 minutes. According to\u00a0RedHat,\u00a0nearly ninety percent\u00a0of organizations experienced at least one Kubernetes security incident in the past year. Container-based lateral movement rose 34% in 2025.<\/p>\n<p>The workloads are where the value is. The adversaries have noticed.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-7409de1b47a26a2220537007651eb9b9\" id=\"h-runtime-protection-the-lesson-nbsp-voidlink-nbsp-teaches\" style=\"font-style:normal;font-weight:400\">Runtime protection: The lesson\u00a0VoidLink\u00a0teaches<\/h2>\n<p>VoidLink\u00a0exposes a critical gap in how most organizations approach security. It targets the \u2018user space\u2019 where traditional security agents live. By the time your EDR or CSPM looks for a signature, the malware has already encrypted itself and vanished. <strong>It\u00a0isn\u2019t\u00a0just evading your\u00a0tools,\u00a0it is\u00a0operating\u00a0in a layer they cannot see.<\/strong><\/p>\n<p>This is where\u202f<strong>runtime security operating at the kernel level<\/strong>\u202fbecomes essential\u2014and a powerful\u00a0new Linux\u00a0kernel technology called\u00a0eBPF\u00a0represents\u00a0a fundamental shift in defensive capability.<\/p>\n<p>Isovalent\u00a0(now part of Cisco), co-creator and\u00a0open source\u00a0leader of\u00a0eBPF, built the\u00a0Hypershield\u00a0agent on this\u00a0foundation.\u00a0Hypershield is an\u00a0eBPF-based security observability and enforcement layer built for Kubernetes. Rather than relying on user-space agents, it deploys\u00a0eBPF\u00a0programs within the kernel to\u00a0observe\u00a0and enforce policy on process executions,\u00a0syscalls, file access, and network activity in real time. Critically,\u00a0Hypershield is Kubernetes-identity-aware: it understands namespaces, pods, workload identities, and labels natively, correlating threats with the exact workloads that spawned them.<\/p>\n<p>Isovalent\u2019s<strong>\u00a0<\/strong>technical analysis\u00a0demonstrates how Hypershield investigates and mitigates\u00a0VoidLink\u2019s\u00a0behavior at each stage of the kill chain. Because it operates\u00a0through\u00a0eBPF\u00a0hooks within the kernel, it observes\u00a0VoidLink\u2019s\u00a0behavior\u202f<em>regardless<\/em>\u202fof how cleverly the malware evades user-space tools.\u00a0VoidLink\u2019s\u00a0entire evasion model is designed to defeat agents\u00a0operating\u00a0above the kernel. Hypershield sidesteps it entirely.<\/p>\n<p>This principle is the new standard for the modern threat landscape: attacks like\u00a0ShadowRay\u00a02.0 or\u00a0NVIDIAScape\u00a0succeed because traditional defenses\u00a0can\u2019t\u00a0see what workloads are doing in real time. Runtime visibility and mitigation control at the kernel level closes that critical window between exploitation and detection that attackers rely on.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-4d149bac7fd3fecbfd23efe7fa2b1749\" id=\"h-the-blind-spot-most-cisos-nbsp-can-t-nbsp-afford\" style=\"font-style:normal;font-weight:400\">The blind spot most CISOs\u00a0can\u2019t\u00a0afford<\/h2>\n<p>Attacks like\u00a0VoidLink,\u00a0ShadowRay, and\u00a0NVIDIAScape\u00a0make one truth unavoidable:\u202f<strong>most organizations are<\/strong> effectively <strong>blind to Kubernetes<\/strong>, where AI models\u00a0run\u00a0and critical workloads live.<\/p>\n<p>Years of investment in endpoints, identity, and cloud monitoring have left Kubernetes\u00a0largely invisible. Treating Kubernetes as a strategic asset, rather than\u00a0\u201can infrastructure detail the platform team handles,\u201d gives security teams the opportunity\u00a0to\u00a0safeguard\u00a0the crown jewels.<\/p>\n<p>Kubernetes is where AI lives:\u00a0models are trained, inference is served, and agents must\u00a0operate\u00a0continuously, no longer tied to the lifecycle of laptops.\u00a0The CISO\u2019s role is also evolving, too, shifting from just securing the perimeter, but the connective tissue between high-velocity DevOps teams building the future and the stakeholders who need assurance that\u00a0the future is protected.<\/p>\n<p>Kernel-level runtime security provides the real-time \u201csource of truth.\u201d Malware can evade user-space tools, but it cannot hide from the system itself. Platforms like Hypershield give CISOs the same ground-truth visibility in the kernel\u00a0they\u2019ve\u00a0had on endpoints for decades\u2014so teams can see and respond in real time, with zero overhead.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-8dd255668da6fc252d01bd4bd51af231\" id=\"h-the-nbsp-path-nbsp-forward\" style=\"font-style:normal;font-weight:400\">The\u00a0path\u00a0forward<\/h2>\n<p>The\u00a0path forward is not complicated, but it requires deliberate prioritization:<\/p>\n<ul class=\"wp-block-list\">\n<li>Treat Kubernetes and AI workloads as first-class security assets.<\/li>\n<li>Deploy runtime security that provides kernel-level, real-time visibility.<\/li>\n<li>Integrate workload monitoring into SOC workflows to detect and respond confidently.<\/li>\n<\/ul>\n<p>Cisco has led innovation in workload security, leveraging\u00a0Hypershield\u00a0together with Splunk for monitoring and runtime security for critical workloads.<\/p>\n<p>The battlefield has shifted. Adversaries have invested in building cloud-native, container-aware,\u00a0AI-accelerated offensive capabilities specifically engineered for the infrastructure that now runs the world\u2019s most valuable workloads. The question for every organization is whether\u00a0their defenses have kept pace.<\/p>\n<p>The evidence from the past twelve months suggests most have not. The evidence from the next twelve will reflect the decisions made today.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p class=\"has-text-align-center\" id=\"block-a1b11bef-8542-478b-95c4-6b43d582001b\"><em>We\u2019d love to hear what you think! Ask a question and stay connected with Cisco Security on social media.<\/em><\/p>\n<p class=\"has-text-align-center\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-cisco-green-color\">Cisco Security Social Media<\/mark><\/strong><\/p>\n<p class=\"has-text-align-center\" id=\"block-85b5e58a-7e0a-4b88-a1bd-54a5f658e51f\">LinkedIn<br \/>Facebook<br \/>Instagram<\/p>\n<\/p><\/div>\n<p><script async defer src=\"https:\/\/platform.instagram.com\/en_US\/embeds.js\"><\/script><br \/>\n<br \/><p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Part 1: How a cloud-native malware framework built by AI in under a week exposed the next great blind spot in enterprise security In\u00a0December 2025,\u00a0Check [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16820,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-16819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/comments?post=16819"}],"version-history":[{"count":0,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16819\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media\/16820"}],"wp:attachment":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media?parent=16819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/categories?post=16819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/tags?post=16819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}