iWorld
Lionsgate Q3 revenue hits $724.3m, net loss widens to $46.2m
Motion picture gains offset by TV slowdown and rising promotional spend
CALIFORNIA: Lionsgate reported quarterly revenue of more than $724 million, yet the Hollywood studio slipped to a net loss exceeding $46 million as rising marketing costs erased gains from an otherwise robust film slate.
Adjusted earnings missed analyst expectations, with the shortfall largely attributed to aggressive promotional spending behind theatrical releases. The motion picture division led growth, posting a 35 per cent jump in revenue to $421 million, but profitability was squeezed as costs climbed sharply.
Television production revenue fell 25 per cent to $303 million, which the company attributed to the timing of programme deliveries rather than weakening demand.
The standout performer remained Lionsgate’s content library. Revenue from its catalogue of more than 20,000 titles rose 10 per cent on a trailing 12-month basis to over $1 billion, marking a fifth consecutive quarter of record growth and reinforcing the library’s status as the company’s most reliable cash generator.
Beyond the numbers, Lionsgate sent a clearer signal to investors by confirming it will allow its shareholder rights plan, commonly known as a ‘poison pill,’ to expire in May. The move leaves the studio more exposed to takeover approaches at a time when consolidation pressures continue to build across the media industry.
While Lionsgate continues to back a pipeline of IP-driven films, the easing of takeover defences suggests management sees greater value in the company’s scale, production infrastructure and extensive library than in remaining independent.
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






