{"id":452,"date":"2018-05-04T13:00:12","date_gmt":"2018-05-04T13:00:12","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541248"},"modified":"2018-05-04T13:00:12","modified_gmt":"2018-05-04T13:00:12","slug":"this-week-in-security-news-zippys-and-flynn","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/","title":{"rendered":"This Week in Security News: Zippy\u2019s and Flynn"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Hawaii-based restaurant Zippy\u2019s suffered a POS data breach. In addition, Uber executive John Flynn argued that user expectations on data protection are rising, but consumers still aren\u2019t implementing the right precautions for their own data safety.<\/p>\n<p>Read on to learn more.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/state-of-the-art-security-the-role-of-technology-in-the-journey-to-gdpr-compliance\/\"><strong>State-of-the-Art Security: The Role of Technology in the Journey to GDPR Compliance<\/strong><\/a><\/p>\n<p><em>As we\u2019ve discussed over the last 7 weeks in our video case study<\/em> <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/capabilities\/solutions-for\/gdpr-compliance\/video-case-study.html\"><em>series<\/em><\/a><em>, the GDPR impacts many different areas of our company, including our employees, customers, and partners.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/protecting-your-privacy-part-1-the-privacy-risks-of-social-networks-and-online-browsing\/\"><strong>PROTECTING YOUR PRIVACY \u2013 Part 1: The Privacy Risks of Social Networks and Online Browsing<\/strong><\/a><\/p>\n<p><em>Most Americans today spend many of their waking hours online. In fact, we\u2019re up to spending an average of five hours per day just on our mobiles.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/what-hipaa-and-other-compliance-teaches-us-about-the-reality-of-gdpr\/\"><strong>What HIPAA and Other Compliance Teaches Us About the Reality of GDPR<\/strong><\/a><\/p>\n<p><em>The date for General Data Protection Regulation (GDPR) compliance is three months away, yet many organizations, especially those outside Europe, remain unprepared<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/protecting-your-privacy-part-2-how-to-maximize-your-privacy-on-social-media-and-in-your-browser\/\"><strong>PROTECTING YOUR PRIVACY \u2013 Part 2: How to Maximize Your Privacy on Social Media and in Your Browser<\/strong><\/a><\/p>\n<p><em>You can manually configure your Privacy Settings on sites including Facebook, Twitter, LinkedIn, and more. However, no two sites are the same, and some are easier than others to navigate.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/securing-the-connected-industrial-world-with-trend-micro\/\"><strong>Securing the Connected Industrial World with Trend Micro<\/strong><\/a><\/p>\n<p><em>At Trend Micro we\u2019ve made it our business over the past 30 years to anticipate where technology is taking the world. That\u2019s why our message has evolved over that time from<\/em> <em>Peace of Mind Computing<\/em> to <em>Your Internet Firewall<\/em> and most recently <em>Securing Your Journey to the Cloud<\/em>.<\/p>\n<div class=\"post-head\" readability=\"25.042492917847\">\n<div class=\"post-title\" readability=\"27.988668555241\">\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/facexworm-targets-cryptocurrency-trading-platforms-abuses-facebook-messenger-for-propagation\/\">FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation<\/a><\/strong><\/p>\n<p><em>Trend Micro\u2019s Cyber Safety Solutions team identified a malicious Chrome extension we named FacexWorm, which uses a miscellany of techniques to target cryptocurrency trading platforms accessed on an affected browser and propagates via Facebook Messenger.\u00a0\u00a0<\/em><\/p>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/blog.trendmicro.com\/how-cryptocurrency-is-shaping-todays-threat-environment\/\"><strong>How cryptocurrency is shaping today\u2019s threat environment<\/strong><\/a><\/p>\n<p><em>Cryptocurrency has exploded as a popular way to support digital transactions. Since its creation, users have discovered an array of different ways to leverage cryptocurrency, including within mining strategies and digital wallets.<\/em><strong>\u00a0<\/strong><\/p>\n<div class=\"post-head\" readability=\"22.992805755396\">\n<div class=\"post-title\" readability=\"25.697841726619\">\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cryptocurrency-mining-malware-targeting-iot-being-offered-in-the-underground\/\">Cryptocurrency-Mining Malware Targeting IoT, Being Offered in the Underground<\/a><\/strong><\/p>\n<p><em>Cryptocurrencies have been generating much buzz of late. While\u00a0<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-03-26\/what-the-world-s-governments-are-saying-about-cryptocurrencies\" target=\"_blank\" rel=\"noopener\">some<\/a>\u00a0<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/d358zk\/canada-is-gearing-up-to-regulate-cryptocurrency-parliament-hearing\" target=\"_blank\" rel=\"noopener\">governments<\/a>\u00a0are at work to regulate transactions involving them, there are others that want to\u00a0<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/8xk4e4\/bitcoin-ban-plattsburgh-coinmint-mining\" target=\"_blank\" rel=\"noopener\">stop mining activities<\/a>\u00a0related to them altogether.\u00a0\u00a0<\/em><\/p>\n<div class=\"post-head\" readability=\"24.458823529412\">\n<div class=\"post-title\" readability=\"26.682352941176\">\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/legitimate-application-anydesk-bundled-with-new-ransomware-variant\/\">Legitimate Application AnyDesk Bundled with New Ransomware Variant<\/a><\/strong><\/p>\n<p><em>Trend Micro recently discovered a new ransomware (Detected as RANSOM_BLACKHEART.THDBCAH), which drops and executes the legitimate tool known as AnyDesk alongside its malicious payload.\u00a0\u00a0<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.scmagazine.com\/zippys-restaurants-suffers-pos-data-breach\/article\/762902\/\"><strong>Zippy\u2019s Restaurants Suffers POS Data Breach<\/strong><\/a><\/p>\n<p><em>Zippy\u2019s Restaurants\u2019 point-of-sale system was compromised for four months, exposing customer data.<\/em><\/p>\n<p><a href=\"https:\/\/thediplomat.com\/2018\/05\/asean-cybersecurity-in-the-spotlight-under-singapores-chairmanship\/\"><strong>ASEAN Cybersecurity in the Spotlight Under Singapore\u2019s Chairmanship<\/strong><\/a><\/p>\n<p><em>At ASEAN Summit 2018 in Singapore, the strong focus on cybersecurity reflected regional and international attention to growing cyber threats in Southeast Asia.<\/em><\/p>\n<p><a href=\"https:\/\/www.independent.co.uk\/news\/uk\/home-news\/uk-businesses-cyber-attacks-security-breach-figures-fraud-hackers-government-report-a8321931.html\"><strong>Almost Half of UK Businesses Suffered Cyberattack or Security Breach Last Year, Figures Show<\/strong><\/a><\/p>\n<p><em>The 2018 Cyber Security Breaches Survey found 19 percent of charities and 43 percent of businesses in the UK had reported cyber security breaches or attacks in the last year.<\/em><\/p>\n<p><a href=\"http:\/\/fortune.com\/2018\/05\/02\/facebook-cambridge-analytica-scandal-states-data-security\/\"><strong>Commentary: States Are Getting Tough on Data Security\u2014but That Might Be a Problem<\/strong><\/a><\/p>\n<p><em>The Facebook-Cambridge Analytica scandal shines a light on the need for more regulation protecting data; more than 240 bills were introduced in 42 states last year covering a range of security issues.<\/em><\/p>\n<p><a href=\"http:\/\/observer.com\/2018\/05\/uber-data-breach-collision\/\"><strong>Uber Security Head Says Users Need to Care More About Data After Breach<\/strong><\/a><\/p>\n<p><em>At the 2018 Collision Tech Conference, John Flynn relayed that user expectations on data protection are rising, but customers still aren\u2019t taking the right actions to protect their personal information.<\/em><strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/alexa-can-listen-indefinitely-potentially-exploited-to-transcribe-information-to-cybercriminals\">Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals<\/a><\/strong><\/p>\n<p><em>Researchers discovered a new\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/threat-intelligence-center\/internet-of-things\/\">internet of things (IoT)<\/a>\u00a0design flaw in a popular\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/google-home-mini-speaker-discovered-eavesdropping-on-home-user\">smart home system<\/a>: They found that Amazon\u2019s Alexa service can be programmed to\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/amazons-alexa-could-be-tricked-into-snooping-on-users-say-security-researchers\/#ftag=RSSbaffb68\">eavesdrop<\/a>on its users and transcribe all the information heard.\u00a0\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/securing-the-internet-of-things-through-effective-regulation\"><strong>Securing the Internet of Things Through Effective Regulation<\/strong><\/a><\/p>\n<p><em>According to a survey done by Gartner, almost 20 percent of organizations have observed at least one IoT-based attack in the last three years.<\/em><\/p>\n<p class=\"c-page-title\"><strong><a href=\"https:\/\/www.curbed.com\/2018\/4\/18\/17254382\/hack-hackers-smart-city-cybersecurity\">As cities get high-tech, hackers become more dangerous<\/a><\/strong><\/p>\n<p id=\"FHlijs\"><em>Remember when a major U.S. city\u2019s computer infrastructure was hacked, and held ransom, by a group of cyber criminals?<\/em><\/p>\n<p><span>Do you agree with John Flynn\u2019s speech on user expectations for data pro<\/span>tection? Share your thoughts in the comments below or follow me on Twitter to continue the conversation; <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-zippys-and-flynn\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Hawaii-based restaurant Zippy\u2019s suffered a POS data breach. In addition, Uber executive John Flynn argued that user expectations on data protection are rising, but consumers still aren\u2019t&#8230;<br \/>\nThe post This Week in Security News: Zippy\u2019s and Flynn appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":453,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[345,21,311,101,346,312,77,5],"class_list":["post-452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-cambridge-analytica","tag-cryptocurrency","tag-current-news","tag-data-privacy","tag-facexworm","tag-gdpr","tag-iot","tag-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Week in Security News: Zippy\u2019s and Flynn 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Security News: Zippy\u2019s and Flynn 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-04T13:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/this-week-in-security-news-zippys-and-flynn.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Week in Security News: Zippy\u2019s and Flynn\",\"datePublished\":\"2018-05-04T13:00:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/\"},\"wordCount\":780,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/this-week-in-security-news-zippys-and-flynn.jpg\",\"keywords\":[\"Cambridge Analytica\",\"Cryptocurrency\",\"Current News\",\"Data Privacy\",\"FacexWorm\",\"GDPR\",\"IoT\",\"Privacy\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/\",\"name\":\"This Week in Security News: Zippy\u2019s and Flynn 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/this-week-in-security-news-zippys-and-flynn.jpg\",\"datePublished\":\"2018-05-04T13:00:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/this-week-in-security-news-zippys-and-flynn.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/this-week-in-security-news-zippys-and-flynn.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-zippys-and-flynn\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cambridge Analytica\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cambridge-analytica\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Security News: Zippy\u2019s and Flynn\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Security News: Zippy\u2019s and Flynn 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/","og_locale":"en_US","og_type":"article","og_title":"This Week in Security News: Zippy\u2019s and Flynn 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-04T13:00:12+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/this-week-in-security-news-zippys-and-flynn.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Week in Security News: Zippy\u2019s and Flynn","datePublished":"2018-05-04T13:00:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/"},"wordCount":780,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/this-week-in-security-news-zippys-and-flynn.jpg","keywords":["Cambridge Analytica","Cryptocurrency","Current News","Data Privacy","FacexWorm","GDPR","IoT","Privacy"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/","url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/","name":"This Week in Security News: Zippy\u2019s and Flynn 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/this-week-in-security-news-zippys-and-flynn.jpg","datePublished":"2018-05-04T13:00:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/this-week-in-security-news-zippys-and-flynn.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/this-week-in-security-news-zippys-and-flynn.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-zippys-and-flynn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cambridge Analytica","item":"https:\/\/www.threatshub.org\/blog\/tag\/cambridge-analytica\/"},{"@type":"ListItem","position":3,"name":"This Week in Security News: Zippy\u2019s and Flynn"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=452"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/453"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}