{
    "file_item": {
        "filepath": "threat-intelligence",
        "filename": "TLP-WHITE-CERT-EU-MEMO-190612-1.pdf"
    },
    "title": "Hardware Security Modules not immune to hacking",
    "publish_date": "24-07-2019 09:41:00",
    "description": "- Security researchers released a paper revealing how they managed to hack a Hardware Security Module (HSM).<br>- HSM-s are used to generate, manipulate and store sensitive cryptographic secrets (SIM cards, credit cards, secure boot hardware, disk and database encryption, PKI...).<br>- HSM-s are also used by cloud service providers, such as Google or Amazon, allowing clients to centrally create, manage and use their cryptographic secrets.",
    "url_title": "threat-memo-190612-1",
    "content_markdown": null,
    "content_html": null,
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}