{"version":"1.0","provider_name":"AMI","provider_url":"https:\/\/www.ami.com","title":"Be Proactive About Firmware Security!","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"amfoWqBuyy\"><a href=\"https:\/\/www.ami.com\/resource\/be-proactive-about-firmware-security\/\">Be Proactive About Firmware Security!<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ami.com\/resource\/be-proactive-about-firmware-security\/embed\/#?secret=amfoWqBuyy\" width=\"600\" height=\"338\" title=\"&#8220;Be Proactive About Firmware Security!&#8221; &#8212; AMI\" data-secret=\"amfoWqBuyy\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ami.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/firmware-security_1140x550.jpg","thumbnail_width":1140,"thumbnail_height":550,"description":"Firmware is everywhere; in every system and nearly every technology device we use on a daily basis \u2013 clearest example would be computers\/laptops. Firmware is also highly vulnerable to malware attacks, where hackers corrupt the firmware to create persistent problems for the firmware despite security managers \u201cfixing\u201d the initial issue. Firmware attacks are so common [&hellip;]"}