iWorld
Citadel Indian & Italian spinoffs axed as Amazon rewrites its spy game
MUMBAI: Amazon has pulled the plug on Citadel: Honey Bunny and Citadel: Diana, the much-hyped Indian and Italian offshoots of its globe-trotting spy saga. Instead, those “successful and widely enjoyed international chapters” will be stitched into season two of the main series, Citadel, which is now set to drop globally in Q2 of 2026.
That’s the word from Amazon MGM Studios television head Vernon Sanders, who promised an “exhilarating” return. “With high-stakes storytelling, new additions to our amazing cast and bold, cinematic ambition,” he said, “season two will deepen the emotional journeys of Nadia, Mason and Orlick against the relentless force that is Manticore.”
Translation? The spinoffs are toast, and Amazon’s once-grand plan to build a Bond-style franchise without Bond is looking like an expensive misfire.
The cancellation comes on the heels of Jennifer Salke’s exit from the studio. Salke, who first pitched the sprawling espionage epic to Joe and Anthony Russo, dreamt up Citadel as a prestige powerhouse for Prime Video—an interconnected universe with local-language series spanning continents. What she got instead: ballooning budgets, reshoots galore and a reported $300m price tag for season one.
Still, Citadel got renewed before its April 2023 premiere. But season two was quietly delayed after Amazon brass were said to be “unhappy” with early footage. Now, storylines from Honey Bunny and Diana—which, despite being ratings hits in India and Italy, respectively—will be merged into the mothership’s narrative.
The new season picks up a month after the first ended: the spies are underground, hunted by Manticore, and pulled back into action to stop Brazilian billionaire Paulo Braga from unleashing a world-ending device, courtesy of Citadel’s own Bernard Orlick.
So yes, the spies are still in the game. But Amazon’s dream of a global franchise? That’s very much under review.
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






