{"id":2506,"date":"2020-04-27T08:38:43","date_gmt":"2020-04-27T06:38:43","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=2506"},"modified":"2023-08-16T11:25:00","modified_gmt":"2023-08-16T09:25:00","slug":"security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/","title":{"rendered":"Security Center: there is a serious security bug that impacts FPGA chips"},"content":{"rendered":"\n<p>Welcome to the next episode of the <a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Xopero Security Center (opens in a new tab)\">Xopero Security Center<\/a>! A team of academics discovered a new security bug that impacts FPGA chips used in data centers, IoT devices and many safety-critical applications today. What\u2019s worse \u2013 it looks like there is no way to fix these issue. Houston, we have a problem\u2026<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<!--more-->\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"newly-discovered-bug-impacts-fpga-chips-used-in-data-centers-iot-devices-and-many-more-safetycritical-applications\">Ne<strong>wly discovered bug impacts <\/strong>FPGA <strong>chips used in data centers, IoT devices and many more safety-critical applications<\/strong> <\/h2>\n\n\n<p>A new security bug impacts FPGA (Field Programmable Gate Arrays) chipsets. Named Starbleed it allows attackers to extract and tamper with a configuration file to reprogram the chip with malicious code. This is concerning because FPGA can be found in many safety-critical applications today, from cloud data centers and mobile phone base stations to encrypted USB-sticks and industrial control systems. The attack can be carried out remotely \u2013 the hacker doesn\u2019t have to have physical access to the FPGA. Researchers believe there is no way to fix these issue \u2013 it seems that replacing the FPGA chip may be the only safe solution.&nbsp;<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/starbleed-bug-impacts-fpga-chips-used-in-data-centers-iot-devices-industrial-equipment\/\" target=\"_blank\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"victorygate-the-cryptomining-botnet-was-taken-down\"><strong>VictoryGate, the cryptomining botnet was taken down<\/strong><\/h2>\n\n\n<p>The botnet has been active since May 2019 and during this time it infected more than 35,000 computers. Most of its victims were located in Latin America, with Peru accounting for more than 90% of the total victim count. According to ESET the botnet&#8217;s primary purpose was to infect victims with malware that mined the Monero cryptocurrency behind their backs. The botnet was controlled using a server hidden behind the No-IP dynamic DNS service. ESET reported and took down the botnet&#8217;s command and control (C&amp;C) server and set up a fake one (called a sinkhole) to monitor and control the infected hosts.<\/p>\n\n\n\n<p><strong>A very \u201cinteresting\u201d distribution method.<\/strong> It looks like all victims have received&#8230; a USB drive. After the malicious USB was connected to the victim&#8217;s computer, the malware was installed on the device. It appears that the VictoryGate malware might have been secretly installed on a tainted batch of USB storage devices that have been shipped inside Peru. VictoryGate contains a component that copies the USB infector to new USB devices connected to a computer, helping it spread to new devices.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-banking-trojan-uses-elaborate-attack-techniques-to-still-credentials-and-take-over-bank-accounts\"><strong>New banking trojan uses \u201celaborate\u201d attack techniques to still credentials and take over bank accounts<\/strong><\/h2>\n\n\n<p>The malware, dubbed \u201cBanker.BR\u201d, was spotted in messages targeting users in countries that speak Spanish or Portuguese (including Spain, Portugal, Brazil and other parts of Latin America). According to researchers from IBM X-Force the malicious code is entirely new and does not rely on previously leaked code or existing mobile malware.&nbsp;<\/p>\n\n\n\n<p><strong>Modus operandi. <\/strong>The malware is spread via messages that lead users to a malicious domain controlled by the attackers. The domain instructs victims to download the most recent version of a purported \u201csecurity app\u201d required for mobile banking. If victims click the update button, they unwittingly launch the malware download from a legitimate file-sharing platform. After being installed on the victim\u2019s device, the malware scoops up device information \u2013 including phone number, International Mobile Equipment Identity (IMEI), International Mobile Subscriber Identity (IMSI) and SIM serial number \u2013 and sends it the command and control (C2) server, which is a domain address hardcoded into the malware.<\/p>\n\n\n\n<p>Similar to other malware, Banker.BR abuses the Accessibility service on phones in order to grant itself permissions on the phone without the victim\u2019s knowledge. These permissions give the malware to access contacts, camera, SMS messages and more. Once the victim goes to a banking domain, the malware then deploys an overlay screen, which typically features the bank\u2019s logo and asks for the user\u2019s sign-in credentials. The victim enters these credentials, unwittingly giving them to the attacker \u2014 who can now access the victim\u2019s bank account and launch fraudulent transfers. The malware can also exfiltrate victims\u2019 SMS messages, which allows it to grab any potential two-factor authentication (2FA) codes sent to the user by the bank.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/android-banking-br-trojan-credential-stealing\/154990\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"there-is-a-new-phishing-campaign-targeting-skype-business-users\"><strong>There is a new phishing campaign targeting Skype business users<\/strong><\/h2>\n\n\n<p>Remote workers are being warned of a new phishing campaign targeting their Skype passwords. The social engineering in this campaign is refined enough to make victims access the fraudulent login page and provide their credentials. The phishing emails look \u201ceerily similar\u201d to a legitimate Skype notification alert. Emails indicate users have 13 pending Skype notifications that can be checked by clicking a \u201cReview\u201d button. The level of impersonation in the template is also interesting as the attacker clearly put in some effort to make it look legitimate. A logo of the victim&#8217;s company is present on the phishing page along with a warning under the login box saying &#8222;the system is for the use of authorized users&#8221; of the company. The username is also auto-filled (due to the URL containing the base64 of the target email address) \u2013 another trick that leaves little room for doubt. The only thing left for the user to do is to enter his or her password, which then falls into the hands of the threat actor.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/creative-skype-phishing-campaign-uses-googles-app-gtld\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"malicious-ads-are-a-serious-problem-and-during-the-covid19-pandemic-more-deadly-than-ever\"><strong>Malicious ads are a serious problem and during the COVID-19 pandemic more deadly than ever<\/strong><\/h2>\n\n\n<p>Google has taken steps to crackdown on fake or misleading advertising as fraudulent ads and counterfeits surge during the COVID-19 pandemic. How? By extending its identity verification policy from political ads to all advertising on its platforms.<\/p>\n\n\n\n<p>Advertisers will be required to complete a verification program in order to buy ads on Google network. They will need to submit personal identification, business incorporation documents or other information that proves who they are and the country in which they operate.<\/p>\n\n\n\n<p>The main goal is to help support the health of the digital advertising ecosystem by detecting bad actors and limiting their attempts to misrepresent themselves.<\/p>\n\n\n\n<p><strong>Little too late?<\/strong> Although the program will start in the US this summer, it could take years to complete, which may be too late to stop the surge in scams peddling counterfeit and fake COVID-19 products. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/google-tackles-fake-ads-covid19\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-6\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\"><strong>Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/strong><\/h2>\n\n\n<p>1. Window 10 update weakened Google Chrome&#8217;s security (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/window-10-update-weakened-google-chromes-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">BleepingComputer<\/a>)<br>2. Hacker returns $25 million after their IP address is exposed (<a href=\"https:\/\/www.hackread.com\/hacker-returns-25m-after-ip-address-exposed\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">HackRead<\/a>)<br>3. Hey there! Are you using WhatsApp? Your account may be hackable (<a href=\"https:\/\/www.welivesecurity.com\/2020\/04\/20\/hey-there-using-whatsapp-your-account-hackable\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">We live security<\/a>)<br>4. CS:GO &amp; Team Fortress 2 source code leaked \u2013 Virus alert for TF2 (<a href=\"https:\/\/www.hackread.com\/csgo-team-fortress-2-source-code-leaked-tf2-virus\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">HackRead<\/a>)<br>5. New iPhone text-bomb bug: Just receiving this Sindhi character notification crashes iPhones (<a href=\"https:\/\/www.zdnet.com\/article\/new-iphone-text-bomb-bug-just-receiving-this-sindhi-character-notification-crashes-iphones\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ZDNet<\/a>)<br>6. Maze Ransomware Attack Hits Cognizant (<a href=\"https:\/\/threatpost.com\/maze-ransomware-cognizant\/154957\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ThreatPost<\/a>)<br>7. Automated Bots Are Increasingly Scraping Data &amp; Attempting Logins (<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/automated-bots-are-increasingly-scraping-data-and-attempting-logins\/d\/d-id\/1337615\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Dark Reading<\/a>)<br>8. Hackers trick 3 British Private Equity firms into sending them $1.3 Million (<a href=\"https:\/\/thehackernews.com\/2020\/04\/bec-scam-wire-transfer-money.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Hacker News<\/a>)<br>9. Researchers Use Microsoft Terminal Services Client in New Attack Method (<a href=\"https:\/\/www.darkreading.com\/endpoint\/researchers-use-microsoft-terminal-services-client-in-new-attack-method\/d\/d-id\/1337614\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Dark Reading<\/a>)<br>10. Fast-Moving DDoS Botnet Exploits Unpatched ZyXel RCE Bug (<a href=\"https:\/\/threatpost.com\/fast-moving-ddos-botnet-unpatched-zyxel-rce-bug\/155059\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ThreatPost<\/a>)<\/p>\n\n\n\n<p>See you next Monday!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the Xopero Security Center! A team of academics discovered a new security bug that impacts FPGA chips used in data centers, IoT devices and many safety-critical applications today. What\u2019s worse \u2013 it looks like there is no way to fix these issue. Houston, we have a problem\u2026<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-2506","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Center: there is a serious security bug that impacts FPGA chips - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Xopero Security Center: a team of academics discovered a new security bug that impacts FPGA chips used in data centers, IoT devices and many...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Center: there is a serious security bug that impacts FPGA chips - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Xopero Security Center: a team of academics discovered a new security bug that impacts FPGA chips used in data centers, IoT devices and many...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-27T06:38:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T09:25:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Security Center: there is a serious security bug that impacts FPGA chips\",\"datePublished\":\"2020-04-27T06:38:43+00:00\",\"dateModified\":\"2023-08-16T09:25:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/\"},\"wordCount\":1131,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/\",\"name\":\"Security Center: there is a serious security bug that impacts FPGA chips - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-04-27T06:38:43+00:00\",\"dateModified\":\"2023-08-16T09:25:00+00:00\",\"description\":\"Xopero Security Center: a team of academics discovered a new security bug that impacts FPGA chips used in data centers, IoT devices and many...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Center: there is a serious security bug that impacts FPGA chips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Center: there is a serious security bug that impacts FPGA chips - Xopero Blog","description":"Xopero Security Center: a team of academics discovered a new security bug that impacts FPGA chips used in data centers, IoT devices and many...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/","og_locale":"pl_PL","og_type":"article","og_title":"Security Center: there is a serious security bug that impacts FPGA chips - Xopero Blog","og_description":"Xopero Security Center: a team of academics discovered a new security bug that impacts FPGA chips used in data centers, IoT devices and many...","og_url":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-04-27T06:38:43+00:00","article_modified_time":"2023-08-16T09:25:00+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Security Center: there is a serious security bug that impacts FPGA chips","datePublished":"2020-04-27T06:38:43+00:00","dateModified":"2023-08-16T09:25:00+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/"},"wordCount":1131,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/","url":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/","name":"Security Center: there is a serious security bug that impacts FPGA chips - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-04-27T06:38:43+00:00","dateModified":"2023-08-16T09:25:00+00:00","description":"Xopero Security Center: a team of academics discovered a new security bug that impacts FPGA chips used in data centers, IoT devices and many...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/security-center-there-is-a-serious-security-bug-that-impacts-fpga-chips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Security Center: there is a serious security bug that impacts FPGA chips"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=2506"}],"version-history":[{"count":10,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2506\/revisions"}],"predecessor-version":[{"id":5006,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2506\/revisions\/5006"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=2506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=2506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=2506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}