Loading summary
A
Meta suspends Mexican cartel accounts Multiple vulnerabilities have been found in Linux app Armour. Instagram will disable support for end to end encrypted messaging and a supply chain attack hits AppsFlyer this is the risky bulletin prepared by Catalyn Kim Panu and read by me, Claire aird. Today is the 16th of March and this podcast episode is brought to you by Sublime Security. In today's top story, Meta has suspended thousands of accounts used by Latin American drug cartels. The accounts were used to recruit mules, coordinate violence or extortion operations and sell drugs. The company says it used AI to detect coded language and photos of drugs advertised on its platforms. Most of the suspended accounts were from Mexico. Some were also located in the U.S. in other news, the threat actor has leaked the source code of Sweden's E government portal. A hacker going by the name Byte to Breach claims to have stolen the code from a government IT contractor. The contractor is the Swedish division of global IT giant CGI Group. IT confirmed the breach on Thursday. The hacker published the code to prove they had gained access. They're selling citizen data and what they describe as electronic signing documents. A former high ranking official in Germany's intelligence service fell victim to a signal spear phishing attack. Arndt Freitag von Loringhoven told reporters he was the target amid attack that coaxed his signal pin out of him, according to Der Spiegel. Other high ranking German politicians also fell for the same attack Last week. Dutch intelligence agencies said that Russia was behind a global campaign to hack signal and WhatsApp accounts. Moscow residents are in their second week without mobile Internet access was cut off on March 6 without any explanation from officials. The outage began two weeks after the FSB was given the power to cut Internet access at will. Russian news outlets are reporting that some mobile operators have restored access to a small number of government approved sites. A threat actor has compromised the app's flyer analytics service to deliver a cryptocurrency address. Hijacker the the code was deployed in the company's mobile and web based SDKs. The malware waits for copy paste operations, intercepts cryptocurrency addresses and replaces them with one controlled by attackers. The malware has targeted Bitcoin, Ethereum, Solana Ripple and Tron currencies. A threat actor has breached hundreds of GitHub accounts to add malicious code to Python projects. The hacks began on March 8 and added a crypto wallet stealer. Step Security says the attackers are using GitHub credentials stolen by Glass Worm, which hit the VS code ecosystem last year. The campaign also reuses the Glass worm infrastructure. Instagram will disable support for end to end encrypted private messaging in May. The social network has advised users to download any sensitive media from their chats before support is disabled. Instagram did not give a reason for its decision. Earlier this month, TikTok said it would not support encrypted direct messaging because it would not be able to scan for abusive content. 94 individuals have been detained as part of an Interpol operation against cybercrime organisations. 50 of those arrests were in Bangladesh and Togo. The suspects are accused of being involved in phishing, ransomware and online scam operations. Law enforcement also seized 30 33,000 phishing sites and 45,000 IP addresses used to host them. The arrests were part of Interpol's Operation Synergia 3. A British man has been charged in Dubai for publishing Iranian missile strike videos on social media. Local cybercrime laws prohibit the publishing of content that may cause panic or is related to national security. The suspect was identified as a 60 year old tourist. He he faces at least two years in prison and a fine of up to $54,000. A Tennessee grandmother spent six months in jail after being misidentified by AI. Angela Lips says she was jailed for bank fraud despite having never been to North Dakota where the crime was committed. She was charged solely based on a facial recognition match. The FBI is seeking information from victims of malware on the Steam gaming platform that the bureau has asked anyone who downloaded malicious games to make contact. In recent years, there's been an increase in malicious games on Steam. Most are infected with infostealers. A suspected Kazakhstani APT group is targeting water infrastructure in neighbouring countries. Espionage campaigns have targeted hydroelectric power plants in Kyrgyzstan and the water ministries of Tajikistan and Uzbekistan. The campaign ran from September 2024 until March last year. This year Kazakhstan announced it's facing a severe drought and water shortages. Water levels have dropped in the Syedaria river, which flows through all four countries. Google has patched an actively exploited zero day in Chrome. The company's patch notes initially mentioned a second zero day. This was later removed. A fix for that second bug is expected later this week. And finally, nine vulnerabilities in the AppArmor Linux kernel security module can allow attackers to bypass kernel protections, escalate to root and break container isolation. Codenamed Crack Armor, the bugs impact all App Armor versions released since 2017. The app is a popular kernel security module used with Ubuntu, Debian Kubernetes and other Linux based products. And that is all for this podcast edition. Today's show was brought to you by our sponsor, Sublime Security. Find them at Sublime Security. Thanks to your company.
Host: Claire Aird, Risky Business Media
Date: March 16, 2026
This episode brings a concise, information-rich roundup of the latest cybersecurity news. The major focus is Meta’s efforts to combat Latin American cartels by suspending criminal accounts, with additional stories including supply chain attacks, government breaches, and critical vulnerabilities. The tone is brisk and informative, reflecting the urgency and breadth of current cybersecurity threats.
The episode is rapid-fire, balanced between standout incidents (Meta vs Cartels, AI misidentification case, supply chain vulnerabilities) and succinct summaries of ongoing global threats. Listeners are left with a clear sense of the scale, variety, and international complexity of the current cybersecurity landscape.