📰 DAILY THREAT BRIEFING
Saturday, April 4, 2026
12 News Items
THN · BleepingComputer · Krebs · Dark Reading · SANS

📰 Cybersecurity News Headlines

Top stories from leading cybersecurity publications as of April 4, 2026.

  1. Inconsistent Privacy Labels Don't Tell Users What They Are Getting
    — Dark Reading

    Data privacy labels are a great idea for mobile apps, but the current versions just aren't good enough.
  2. LinkedIn secretely scans for 6,000+ Chrome extensions, collects data
    — Bleeping Computer

    A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' brows…
  3. Hims & Hers warns of data breach after Zendesk support ticket breach
    — Bleeping Computer

    Telehealth giant Hims & Hers Health is warning that it suffered a data breach after support tickets were stolen from a third-party customer …
  4. China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
    — The Hacker News

    A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year p…
  5. Apple Breaks Precedent, Patches DarkSword for iOS 18
    — Dark Reading

    Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.
  6. Die Linke German political party confirms data stolen by Qilin ransomware
    — Bleeping Computer

    The Qilin ransomware group has claimed responsibility for an attack against Die Linke ('The Left'), forcing an IT systems outage at the poli…
  7. Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
    — The Hacker News

    Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code…
  8. Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
    — Dark Reading

    As organizations disclose breaches tied to TeamPCP's supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and…
  9. Evolution of Ransomware: Multi-Extortion Ransomware Attacks
    — Bleeping Computer

    Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO platform keeps…
  10. Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication
    — Dark Reading

    "Skull vibration harmonics generated by vital signs" can be used to sign in to VR, AR, and MR headsets, according to emerging research.
  11. TeamPCP Supply Chain Campaign: Update 006 – CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments, (Fri, Apr 3rd)
    — SANS ISC

    This is the sixth update to the TeamPCP supply chain campaign threat intelligence report, "When the…
  12. UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
    — The Hacker News

    The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineeri…

Generated by HiveNet.ai Threat Intelligence Platform · April 4, 2026 · Sources: The Hacker News, Bleeping Computer, Krebs on Security, Dark Reading, SANS ISC