Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

TechRadar News

New forum topics

Subscribe to TechRadar News feed
Updated: 1 hour 19 min ago

You're probably not playing The Witcher 4 until 2027 at the earliest, per CD Projekt's latest financial update

Wed, 03/26/2025 - 05:07
  • We have our first hints as to when The Witcher 4 might release
  • According to CD Projekt, it's unlikely to come before 2027
  • This is per the company's latest earnings report

Sorry, but The Witcher 4 is probably another two years away, at least according to CD Projekt.

As spotted by PC Gamer, a snippet of information from CD Projekt's latest earnings presentation has clued us in as to when we can expect The Witcher 4 to release. Or rather, that it's probably not going to hit shelves and digital storefronts until 2027 at the very earliest.

"Even though we do not plan to release The Witcher 4 by the end of 2026, we are still driven by this financial goal," says CD Projekt, commenting on its share-based incentive programs.

"We are not going to announce the precise launch date for the game yet," added CD Projekt CFO Piotr Nielubowicz. "All we could share now to give more visibility to investors is that the game will not be launched within the time frame of the first target for the incentive program, which ends December 31, 2026."

We at least know that The Witcher 4 has entered full-scale production. According to the presentation, the upcoming game has 411 staff members working on it as of February 28, 2025.

A remaining 296 developers are working on other projects at CD Projekt, including Orion (the Cyberpunk 2077 sequel), Sirius, Hadar and others.

You might also like...
Categories: Technology

The growing threat of device code phishing and how to defend against It

Wed, 03/26/2025 - 04:39

Just as we think we’re getting one step ahead of cybercriminals, they find a new way to evade our defenses.

The latest method causing trouble for security teams is that of device code phishing, a technique that tricks users into granting access to sensitive accounts without attackers needing to steal a password.

Microsoft recently issued a warning about a particular device code phishing campaign being conducted by Storm-2372, where a supposed Russian-backed threat actor was wreaking havoc by hijacking user sessions through legitimate authentication flows. These attacks are trickier to detect than usual given that they exploit real login pages (rather than the spoofed versions that traditional phishing techniques relied on) and are capable of bypassing multi-factor authentication (MFA).

The recent warning from Microsoft will most likely be the first of many. Various other platforms follow the same style of authentication flows and attackers will most likely replicate the technique elsewhere. It is down to security teams once again to identify the warning signs of this new breed of phishing, and implement the best cybersecurity practices to get ahead of the curve.

Understanding device code phishing

Unlike traditional credential phishing attacks, device code phishing is unique in that there is no need to directly steal a password. Instead, attackers manipulate victims into handing over access to their accounts by exploiting authentication methods designed to make logging in easier.

They start the same way as most email attacks do: through social engineering. By impersonating a trusted colleague or IT administrator, the attackers send an email invitation to an online meeting (often a Microsoft Teams meeting) that looks legitimate. The email is designed to appear normal – for instance, it might look like a genuine Teams meeting invite.

When the victim clicks the link in the fake invite, they are prompted to log in using a special code (the “device code”), which is provided by the attacker. And because the website they land on is a real Microsoft login page, the user doesn’t suspect anything phishy.

What makes this technique especially dangerous is that it exploits legitimate authentication systems without creating counterfeit ones. This removes the need for attackers to steal passwords. Instead, they can gain access by capturing session tokens which allow them to operate without triggering additional authentication prompts. And because the tokens are already verified, attackers can often bypass MFA.

At first glance, nothing seems unusual. Suspicion is reduced due to the official Microsoft website, and therefore, victims won’t hesitate to enter a device code to authenticate the session. However, instead of linking their own device, they are unknowingly authorizing the attacker's session. Once access is granted, the attacker has the keys to the kingdom and is free to operate within the victim’s account, access sensitive information, and launch lateral attacks.

How users can recognize and avoid these attacks

Device code phishing has created a minefield where legitimate tools are utilized for malicious purposes. Organizations must be proactive in recognizing these attacks and be sure to have effective authentication security measures in place.

Users should always treat unexpected meeting invites with suspicion, especially if they contain login prompts that require immediate action. Before entering any device code, users should verify the legitimacy of the request through a separate communication channel, such as a direct phone call or an internal messaging platform. If a login request appears out of the blue, it’s always best to avoid proceeding until its authenticity is confirmed.

Device codes are particularly impactful as they are designed to be entered on trusted devices. As a result, users should never share a login code with another person or enter a code they receive via email or chat unless they personally initiated the request. Legitimate services will never email a device code and then ask a user to input it on a separate website. If workforces can get to grips with this fundamental security principle, it can prevent many device code phishing attempts from succeeding.

Organizational steps to mitigate risk

Protecting against these attacks can’t rely solely on the user and organizations must take steps to reduce the risk of device code phishing.

One of the most effective measures is to disable any unnecessary device code authentication flows. If it isn’t essential for business operations, then it should be removed to eliminate a significant attack vector. Security teams should regularly review authentication policies and restrict device code logins to only trusted devices.

Conditional access policies go one step further, as they can restrict authentication attempts based on user behavior, device type, geographic location, and risk level. If a login attempt occurs from an unfamiliar location or outside of approved business hours, access can be blocked or require additional verification.

This is why it’s key to embrace behavioral AI measures which can establish baseline “normal” behaviors within an organization's IT environment, and in turn question anything that seems out of the ordinary. Behavioral AI systems analyze characteristics like login patterns to detect anomalies, such as multiple authentication attempts from different locations or unusual device code submissions. By comparing these activities to known-good user behaviors, deviations from the norm can be flagged as suspicious.

And since device code phishing hinges on meeting invites to spread the attack, these should also be monitored. Security teams should regularly audit and flag unusual meeting request patterns, particularly those originating from compromised accounts.

Lastly, security awareness programs should be an ongoing feature of any cybersecurity strategy. Cyber threats evolve constantly, so training should also be continuous. Employees must be trained to recognize the warning signs of device code phishing and understand the risks of entering authentication codes without verification. Creating a culture where security is front of mind when handling unexpected requests is vital.

The time to act is now

As this latest technique continues to prove effective, cybercriminals will no doubt expand their use of device code phishing. Organizations must act now to defend against this emerging threat. A combination of user awareness and strong security policies which are strengthened by advanced threat detection can help organizations to stay ahead.

The sooner organizations implement these measures, the sooner they can reduce their exposure to device code phishing and protect their employees, data, and systems from this growing cyber threat.

We've listed the best identity management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Why OT security needs exposure management to break the cycle of endless patching

Wed, 03/26/2025 - 02:54

Operational technology (OT) has long struggled with modern cybersecurity demands, but operators now face an increasingly dire cyber threat from nation-state actors. OT is essential for managing cyber-physical systems across fields, including manufacturing, transport, and energy, putting it in the sights of hostile actors backed by China, Russia, Iran, and more.

Yet many OT environments are profoundly unprepared for the threat, often struggling with essential vulnerability management activity that should be a baseline to reliable security.

OT security teams should consider a shift to a policy of exposure management, a smarter approach that prioritizes the most exploitable, high-risk vulnerabilities first. Organizations relying on OT must move to reduce operational strain while closing the gaps that leave their systems open to hostile state-backed actors.

Why OT is a prime target for nation-state cyberattacks

OT environments are prime targets for nation-state actors and cybercriminals attacking critical national infrastructure (CNI). Adversaries have a range of objectives, from stealing classified data and conducting corporate espionage to disrupting economic stability.

In the last few years, multiple high-profile incidents have been linked to known threat groups. For example, Volt Typhoon and Salt Typhoon are two prolific groups linked to China that have conducted several attacks on U.S. infrastructure.

Volt Typhoon has infiltrated critical infrastructure, including communications, energy, and water, and is known for using stealthy, low-and-slow tactics to exploit native tools and systems. Salt Typhoon, meanwhile, is believed to be involved in exfiltrating data from ISPs for use by Chinese intelligence operations.

Sandworm, closely linked to Russia’s military intelligence, is another long-running APT targeting critical infrastructure. The group is believed to be behind several attacks on Ukraine’s power grid over the last decade, creating the Industroyer and Industroyer 2 malware designed for industrial equipment using specific protocols. Sandworm also unleashed the notorious NotPetya ransomware.

Iran has also proven itself to be a major player in international cyberattacks. The CyberAv3ngers group has attacked U.S. water facilities using compromised PLCs and HMIs. The group has also targeted civilian infrastructure with IOCONTROL, a Linux-based backdoor designed for multiple standard OT control systems.

While high-level APTs like these have the resources and expertise for advanced tools and tactics, many OT attacks begin with unsecured devices connected to the internet, providing a clear attack path to establish footholds in critical systems.

After assessing nearly one million OT devices across 270 organizations in multiple fields, we found persistent evidence of malware in OT systems. Sample companies in manufacturing, natural resources, and logistics and transportation all had more than 10% of their OT devices communicating with malicious domains.

The problem with traditional vulnerability management

Vulnerability management is a persistent issue across most sectors but can be particularly difficult when dealing with OT environments. In addition to the large and continuously increasing number of vulnerabilities to address, OT security teams must also deal with complex networks that include many disparate assets, often using their own proprietary operating systems. OT assets are seldom compatible with scanning and IT management tools designed for standard IT networks.

As a result, teams often struggle to implement the prioritized, ordered approach to vulnerabilities needed to keep ahead of hostile attacks.

Of the 270 organizations we assessed, 70% had at least one known exploitable vulnerability (KEV) in their OT systems. Twelve percent of the nearly one million devices included in the study contained a KEV that had yet to be patched. Worse, 40% of organizations have OT assets insecurely connected to the internet, creating a direct pathway for cyberattacks.

Security teams are often stuck pursuing slow and inefficient patch management programs that lack clear direction. Prioritization is usually based extensively on CVSS scores, which fail to consider the context within the company and, thus, the vulnerability's real-world exploitability and impact. More dangerous vulnerabilities may be overlooked while less important issues drain resources.

The case for exposure management

Dealing with vulnerable OT assets requires a more dynamic approach, prioritized by the real risk to the organization and its infrastructure. Exposure management has emerged as one of the most effective strategies, enabling teams to identify and focus on vulnerabilities with the most significant potential for real-world exploitation.

Exposure management weighs priorities based on multiple risk factors, including identifying which KEVs are actively exploited in the wild and whether assets are affected by insecure remote access or misconfigurations that increase risk. The assessment also considers a device's criticality to business operations, for example, prioritizing those that would disrupt production or cause safety issues in the event of a breach.

The result is a drastically reduced and more focused to-do list for security teams. For example, our research found roughly 111,000 devices with KEVS. But filtering the list by vulnerabilities linked to ransomware and devices with insecure connectivity immediately reduces the total number to 3,800. Suddenly, the task has shrunk by a factor of 30, even before applying more context for specific organizations.

How to start implementing exposure management in OT security

Exposure management follows a five-step process to identify, assess and resolve OT vulnerabilities.

1. Scoping

The first step is identifying those OT assets most critical to operations, such as production lines in manufacturing or scheduling control systems in maritime transport. This is especially important for asset-intensive companies with a large volume of devices to manage. The aim is to reduce the number of assets that need continuous security inspection.

2. Discovery

Next, this initial list of assets is built into a detailed inventory, focusing on the highest-risk devices. This needs to be a highly data-driven method, while more extensive and complex operations will need an automated approach to make discovery manageable.

3. Prioritization

The high-risk inventory can now be prioritized based on severity. As discussed, this process needs to move beyond basic CVSS scores to consider the actual risk posed by KEVs, the asset’s connectivity status, and the potential impact of a breach. Exploit prediction scoring and business impact assessments provide more data points to inform these decisions.

4. Validation

Before taking any action, it’s crucial to ensure vulnerabilities are exploitable and not blocked by elements like closed ports or firewalls. This avoids wasting resources on patching vulnerabilities that look severe on paper but are low risk in reality.

5. Mobilization

With all that preparation done, it’s time to get moving. It’s best to integrate exposure management into existing security workflows like patching and access control wherever possible to keep things efficient. Organizations should also look to establish cross-team collaboration between IT, security, and operations, as OT often becomes heavily siloed from standard IT practices.

Hardening OT against advanced adversaries

Traditional vulnerability management is failing OT security teams by focusing on attempting to patch everything rather than addressing real threats. In the face of increasingly aggressive state-backed actors, this inefficient approach leaves critical infrastructure vulnerable to severe security incidents.

Identifying and prioritizing high-risk vulnerabilities through an exposure management approach will enable these organizations to manage vulnerabilities quickly and efficiently, drastically improving defenses against nation-state threats, ransomware, and cybercriminals.

We feature the best network monitoring tool.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

AI deregulation: what smart leaders do when the rules go off the rails

Wed, 03/26/2025 - 02:37

While federal guardrails for AI tools in the U.S. are being dismantled—even as global coalitions gather to adopt new standards—tech leaders face a critical choice: exploit the regulatory void for short-term gains, or step up to shape what responsible innovation looks like. Your move matters more than you think.

This isn't just another think piece lecturing you about "tech responsibility"—though responsible tech practices absolutely matter. Instead, it's about building resilient organizations that thrive because of ethical governance, not in spite of it. Let me show you how.

Leading in the Void

When regulations retreat, two things happen at once: responsibility shifts from government oversight directly to your organization, and your decisions take on amplified significance. This vacuum presents a crucial leadership opportunity. When government oversight steps back, the most innovative companies step forward, not to exploit the gaps, but to demonstrate what good governance looks like in practice.

Consider the evolution of privacy practices - companies that proactively developed comprehensive data protection frameworks before GDPR and CCPA became law had a significant advantage. Those that waited found themselves rushing through expensive, disruptive compliance programs. The same dynamic is playing out with AI governance today.

The Now/Next Imperative

Success in this environment requires mastering what I call the Now/Next Continuum—a strategic framework that helps organizations navigate immediate pressures while building toward better futures. It's not about artificially balancing short-term versus long-term thinking—it's about recognizing the natural throughline between them. Today's decisions actively shape tomorrow's possibilities.

This means asking questions like: how will this AI deployment decision affect our ability to adapt to future regulatory changes? What precedent are we setting for our industry? How does this choice align with our vision for technology's role in society?

Building Future-Ready Governance

Your governance framework shouldn't depend on regulatory stability to function. Instead, build systems that:

  • Embed ethics into operational DNA, not just compliance checklists
  • Create feedback loops that catch problems before they become headlines
  • Maintain consistent standards even when external requirements fluctuate
  • Center human outcomes in every decision matrix
  • Establish clear accountability structures for AI-driven decisions
  • Include diverse perspectives in governance discussions
  • Build transparency into AI deployment processes

The most successful organizations aren't waiting for regulatory clarity—they're creating it. They understand that ethical governance isn't a burden—it's a catalyst that drives deeper, more meaningful innovation.

The Leadership Imperative

In an era where tech leaders occupy the highest echelons of policy making and can reshape federal agency positions with a single decision—and where AI continuously finds novel pathways to familiar harms—the argument that "existing rules are sufficient" simply doesn't hold water. Responsibility means far more than mere compliance. Even smaller companies must ask harder questions. We must move beyond "Can we?" to "Should we?" Beyond "Is it legal?" to "Is it right?"

This shift requires developing new muscles: strategic foresight, ethical reasoning, and the ability to balance competing interests while maintaining a clear moral compass. It means building teams that understand both the technical and human implications of AI deployment.

Human-Centered Stability

Building resilient policies in volatile times isn't about predicting every possible regulatory shift. It's about anchoring your governance in something more fundamental: human thriving. This might sound abstract, but when you consistently prioritize human outcomes over regulatory minimums, your policies become naturally resilient to political shifts.

What does this look like in practice? It means designing AI systems that enhance rather than replace human capability, implementing robust testing frameworks that assess societal impact, and creating clear escalation paths for ethical concerns.

The Ethics Advantage

Which all adds up to the plot twist: companies that treat ethics as their operational foundation rather than their compliance checklist aren't just doing good—they do better. They're more innovative, more trusted, and more resilient to market shifts.

These organizations understand that ethical AI isn't about restriction—it's about direction. It's about channeling innovation toward outcomes that create sustainable value for both the business and society. They recognize that the strongest competitive moats aren't built with technology alone, but with technology guided by strong ethical principles.

The future belongs to organizations that understand this fundamental truth: In an era of constant change, where AI advances faster than our ability to regulate it, ethical governance isn't just a responsibility—it's a competitive advantage. The question isn't whether to lead on governance, but how quickly you'll step up to do it.

Your organization's approach to AI governance in this regulatory void won't just determine your short-term success—it will define your legacy in shaping the future of human-centered technology. Choose wisely.

We've featured the best todo list app.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

This obscure laptop brand sells a 64GB AMD Ryzen 9 laptop for just over $700 which is faster than the Apple's M4 CPU

Tue, 03/25/2025 - 17:24
  • Nimo N172 17.3-inch display makes it a workstation powerhouse
  • Upgradeable components extend lifespan, reducing e-waste and increasing sustainability
  • Two-year warranty exceeds Apple’s coverage, ensuring long-term reliability

NIMO has introduced the N172, a high-performance business laptop powered by the AMD Ryzen 9 6950H.

This eight-core, sixteen-thread processor reaches up to 4.9GHz, delivering superior multi-threaded performance over Apple’s M4 in CPU-intensive tasks like 3D rendering, software development, and video editing, making it one of the best laptops for engineering students.

It also supports up to 64GB of DDR5 RAM at 4800MHz and 2TB of PCIe storage, offering customization options that rival the best laptops for coding.

Performance and expandability at an aggressive price

This device supports a 17.3-inch Full HD display with a 1920 x 1080 resolution, a 60Hz refresh rate, an anti-glare coating for better visibility, and a backlit keyboard for low-light usability.

The mobile workstation weighs about 2kg and has dimensions of 15.78 inches x 10.15 inches x 0.78 inches, making it relatively compact for a 17.3-inch laptop.

It comes with a USB 3.2 Gen 1 Type-C port, supporting 5Gbps speeds, three USB-As, an RJ45 LAN port, and HDMI for external displays. Wi-Fi 6 ensures fast and stable internet access.

One of the standout aspects of the N172 is its sustainability-focused design. Unlike many mainstream laptops, which often come with non-upgradable components, this model allows users to extend its lifespan by replacing or upgrading parts over time.

The inclusion of a two-year warranty surpasses Apple’s standard one-year coverage, offering additional peace of mind.

The fully configured model costs $700, while variations start at $460.

Via Nimopc

You may also like
Categories: Technology

Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models

Tue, 03/25/2025 - 17:00
  • Chinese AI startup DeepSeek has released an upgraded AI model called V3-0324 to Hugging Face
  • V3-0324 offers improved reasoning and coding abilities over its predecessors
  • DeepSeek claims its AI models can match or beat those of American AI developers like OpenAI and Anthropic

DeepSeek dropped a major upgrade to its AI model this week, which has people buzzing almost as much as they did when the Chinese AI startup first made its splash earlier this year. The new DeepSeek-V3-0324 model is now live on Hugging Face, setting up an even starker rivalry with OpenAI and other AI developers.

According to the company's tests, DeepSeek's new iteration of its V3 model boasts measurable boosts in reasoning and coding ability. Better thinking and coding might not sound revolutionary on their own, but the pace of improvement and DeepSeek's plans make this release notable.

Formed just last year, DeepSeek has been moving fast, starting with the December release of the original V3 model. A month later, the R1 model for more comprehensive research debuted. Now comes V3-0324, named for its March 2024 release.

DeepSeek demand

The improvements bring the model to near-parity with OpenAI’s GPT-4 or Anthropic’s Claude 2 models. But, even if they aren't quite the same power, they run a lot cheaper, according to DeepSeek.

That's ultimately a huge selling point as AI use, and thus AI costs, continue to increase. Training AI models is notoriously expensive, and OpenAI and Google have huge cloud budgets that most companies couldn't reach without partnerships like OpenAI's with Microsoft. That exclusivity vanishes if DeepSeek's cheaper achievements become more common.

U.S. dominance of AI models is starting to slip anyway, thanks in part to Chinese startups like DeepSeek. It no longer seems shocking when the hottest model emerges from Shenzhen or Hangzhou. Geopolitical considerations, as well as business concerns, have spurred calls to ban DeepSeek from at least the U.S. government.

You probably won't see DeepSeek’s latest release changing everything for your schedule tomorrow, though. It hints that the ballooning demand for computational power and energy to fuel next-generation AI might not be as staggering as feared.

It also just might mean that the AI chatbot rewriting your resume or debugging your website also speaks fluent Mandarin.

You might also like
Categories: Technology

One of the richest men in the world castigates the billions of dollars spent on buying laptops for US classrooms with no apparent improvements

Tue, 03/25/2025 - 16:09
  • Michael Bloomberg argues screens distract students from proven learning methods
  • Students take 20 minutes to refocus after digital distractions
  • True education happens through direct teacher-student engagement, not screens

Laptops are now common in American classrooms, with nearly 90% of schools providing devices to modernize education and prepare students for a digital future.

However, Michael R. Bloomberg, one of the world's wealthiest and most influential figures as the founder and majority owner of Bloomberg LP, has argued the billions spent on these laptops for students have failed to improve academics, shifting focus from traditional learning and raising concerns about declining outcomes.

“As someone who built a company by developing a computer at the dawn of the digital age, I never believed that computers in the classroom were the cure to what ails schools," said Bloomberg.

‘Picking up books and pens’—A call to rethink laptop use in classrooms

"Some of the most powerful educational interactions occur when a caring, well-trained teacher can look into a student’s eyes and help them see and understand new ideas," he went on. "Machines often don’t have that power."

Bloomberg argues instead of increasing reliance on screens, schools should encourage students to spend more time reading, writing, and engaging in direct interactions with teachers and peers.

Laptops for teachers can enhance instruction, but Bloomberg acknowledges that, while student laptops can be useful tools, they cannot replace the value of a well-trained educator guiding students through meaningful learning experiences.

Studies show excessive laptop use in classrooms leads to distraction, with students often taking up to 20 minutes to refocus after engaging in non-academic activities.

Despite widespread laptop use, only 28% of eighth graders and 24% of 12th graders are proficient in math, while reading scores remain low, and US students continue to lag behind their international peers, raising doubts about the effectiveness of widespread laptop adoption in schools.

While the best laptop for engineering students can support advanced computations and specialized software, excessive screen time in general education has not translated into improved academic performance.

A post-pandemic survey found over 25% of students spend at least five hours of classroom time daily on screens, often engaging in educational games that fail to build mastery. In contrast, time-tested methods like reading physical books and writing by hand have been shown to improve retention and comprehension.

You may also like
Categories: Technology

Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring

Tue, 03/25/2025 - 16:00
  • A new Superhubs site in the UK can charge 44 EVs at once
  • Solar panels and massive battery packs help reduce strain on the grid
  • Superhubs are catching on across the globe

Data released this week shows that EV sales are on the rise for the second consecutive month in Europe, as the market continues to grow in the US. But as more customers opt to go electric, the demand naturally increases on the public charging network – and that's where increasingly popular Superhubs come in.

A growing number of fast-charging providers (with help from local governments) are developing these purpose-built ‘Superhubs’ that not only aim to cram in as many battery-powered vehicles as possible, but also harness the power of solar and battery storage in order to reduce the strain on the grid and reduce the cost of charging.

One such site has just been opened by InstaVolt near Winchester in the UK. There are specially-designed bays for electric heavy goods vehicles, as well as smaller vehicles that are towing trailers, plus dedicated accessible charging spots for those with disabilities and extra-long spaces for electric vans.

(Image credit: InstaVolt)

The site can host 44 electric vehicles, all of which can top-up in rapid fashion thanks to 160 kW DC fast chargers. During peak times, InstaVolt charges 85p per kilowatt (around $1.10), but it also offers an off-peak tariff at 54p per kilowatt (around $0.70).

Conveniently-sized charging bays aside, the site also benefits from a massive 870-panel solar array that is paired with an equally gargantuan 960kW/4MWh battery storage system, which reduces the reliance on the grid during peak hours.

Unlike current charging destinations in a typical European service station, InstaVolt’s new Superhub is located just off the main highway, where there is more space and, perhaps more importantly, land is slightly cheaper.

This has allowed the company to add things like 24/7 toilets, a Starbucks, a children’s playground area and a spot to walk the dog. Customers also benefit from air and water provisions, in order to keep those road trips rolling.

Analysis: Superhubs are going global

(Image credit: Tesla)

Earlier this month, the largest EV charging hub opened in South Korea, with charging network operator Water unveiling a mammoth 46-strong hub at the Korea International Exhibition Center (KINTEX) in Goyang.

Catering for everything from tiny city cars to the largest electric trucks, the site offers both 200kW and 100kW charging facilities, while opting for a wooden structure reduced the overall construction carbon footprint compared to concrete or steel structures, according to Electrek.

While not quite on the same scale as those found in Korea or in the UK, a number of slick charging hubs are beginning to appear in the US too, with companies like Mercedes-Benz showcasing what its branded locations look like with the opening of its swanky venue at its US HQ in Sandy Springs, Georgia last year.

Tesla also opened its largest Supercharger site back in 2023, with a staggering 98 charging stalls operational in Coalinga, California, which benefits from solar canopies and Tesla’s own Megapack battery storage system to help ease the reliance on the grid.

(Image credit: Mercedes-Benz USA)

The company also revealed that it plans to open a mammoth 30-acre site in Lost Hills, California, which it says will play host to 168 charging stalls, making it by far the largest EV charging site in operation in the US.

According to Not a Tesla App, the proposed site in Lost Hills, which has been nicknamed ‘Oasis’, could be capable of charging 4,896 vehicles in a 12-hour period.

That said, China takes the top honors, with a staggering 637-stall charging hub located in Shenzhen, which delivers approximately 160 Megawatt-hours (MWh) of power daily and charges more than 4,000 taxis in any given 24-hour period.

But scale isn’t the only thing that electric vehicle owners are looking for, because the convenience factor is lost if you have to drive to a purpose-built hub that might be well away from a chosen route.

Instead, sites like InstaVolt’s Superhub aim to serve those using the busiest and most commonly used travel corridors, negating the need to fight over the limited number of charging stalls tacked on to service areas or gas stations.

You might also like
Categories: Technology

Tesla’s EU sales are in freefall as VW races ahead, but the Model Y could change all that

Tue, 03/25/2025 - 15:00
  • New data suggests Tesla's sales in Europe have almost halved in 2025
  • BYD, Xpeng and Leapmotor have all seen an increase in sales
  • The overall European EV market is up 25% with VW at the top

Tesla’s current sales woes show no sign of slowing, as new data from Jato Dynamics suggests the company’s sales in Europe fell by 45% last month, resulting in its lowest market share in five years.

The issue can be partly attributed to Tesla’s aging model line-up, as customers sit tight for the more accomplished updated Model Y to appear. But many analysts have also cited a more general cooling of demand thanks to Elon Musk’s divisive foray into politics.

Earlier this year, the Financial Times reported on the Volkswagen Group’s slashing of EV production at some of its biggest manufacturing plants, owing to slow uptake of its battery electric vehicles, many early examples of which received middling reviews from the press.

However, the German marque’s BEV sales were up 180% to under 20,000 cars in February, according to Reuters, while the BMW brand and BMW-owned Mini sold almost 19,000 BEVs in February.

Comparatively, Tesla managed to sell fewer than 16,000 cars in key European markets, including the UK, Norway and Switzerland during the same period, despite overall battery electric vehicle registrations being up by 25% in February compared to the previous month.

Although still much smaller in number, BYD also recorded an 94% rise in sales in February, with over 4,000 electric vehicles sold. Similarly, Polestar also celebrated an 84% increase and newcomers, such as Xpeng and Leapmotor, have also started registering sales.

"Brands like Tesla, which have a relatively limited model lineup, are particularly vulnerable to registration declines when undertaking a model changeover," Felipe Munoz, Global Analyst at JATO Dynamics, explained.

But many other industry experts also point to the fact that the Tesla CEO's recent behavior has triggered a backlash from buyers, due to his affiliation with a number of right-wing political parties - particularly those in Germany.

Ahmad Assiri, research strategist at the brokerage Pepperstone, told Sky News that Musk’s political endeavors were “negatively impacting Tesla's reputation among substantial segments of consumers and investors,” adding that BYD’s continued rapid growth was “increasingly attractive to consumers and investors alike”.

Analysis: Everything rides on new Model Y

(Image credit: Tesla UK)

As I have repeatedly stated, Tesla’s latest crop of vehicles is by far its finest yet, with the updated Model 3 and Model Y easily among the best electric vehicles money can buy for most people right now.

During back-to-back testing of the previous generation Model Y and the latest Model 3, the gulf in build quality, refinement, comfort and interior quality is tangible, while gains in efficiency and an increased amount of standard technology is will be welcomed by buyers.

However, the Launch Edition version of the long-awaited Tesla Model Y update is now comparatively expensive, costing a whopping £60,990 in the UK and $52,490 in the US, with many customers likely not only holding for the updated car, but also more affordable variants, which aren’t due to arrive until the summer.

This will naturally skew sales figures, while Tesla has a reputation for cyclical peaks and troughs in its quarterly sales results due to the variations in its pricing and discounting strategy.

The true test of the 'Elon effect' will be later this year, when customers will be presented with a full Model Y line-up. If sales remain slow at that point, perhaps it’ll then be time for Tesla to start panicking.

You might also like
Categories: Technology

Asus unveils its most powerful mini PC to date — but I don't think the Intel-powered NUC 15 Pro+ will compete with Strix Halo models

Tue, 03/25/2025 - 14:28
  • Asus NUC 15 Pro+ boosts performance by 18%, but lacks Strix Halo
  • Compact 0.7-liter design offers tool-free RAM and storage upgrades
  • Ultra-quiet cooling reduces noise by 1.2X under heavy workloads

Asus has introduced the NUC 15 Pro+, its most advanced mini PC yet, featuring Intel’s latest 15th-generation Core Ultra 9 processors and Intel Arc graphics.

This compact system is designed for professional workloads and content creation, positioning itself as one of the most powerful computers in its category.

It delivers an 18% performance boost over previous-generation NUC models with AI-enhanced processing and improved thermal efficiency, but the absence of AMD’s Strix Halo APU raises doubts about its ability to compete with high-performance mini PCs from smaller brands.

Meet the NUC 15 Pro+, Asus's fastest mini PC ever

With support for up to four 4K displays, the NUC 15 Pro+ is designed for multitasking, photo editors, and high-resolution workflows, featuring two HDMI 2.1 supporting 4K at 60Hz and two Thunderbolt 4 ports.

It also supports a USB 3.2 Gen 2 Type-C port, three USB 3.2 Gen 2 Type-A ports, a USB 2.0 Type-A port, an RJ45 LAN port for wired networking, and a Kensington lock for security.

This workstation features Intel Wi-Fi 7 with speeds of up to 46 Gbps, and Bluetooth 5.4, enabling data transfer at up to 2 Mbps with a connection range of 240 meters.

It features a proximity sensor that locks or wakes the system based on user presence, an advanced cooling system that reduces noise by 1.2X compared to previous models and its US MIL-STD-810H certification guarantees 24/7 reliability in extreme conditions.

Asus is positioning the NUC 15 Pro+ as a direct competitor to Apple’s Mac Mini M4, combining a compact 0.7-liter chassis with premium build quality as well as an easy-access design for quick RAM and storage upgrades without tools.

Via TechPowerUp

You may also like
Categories: Technology

Seagate teams with Nvidia to build an NVMe hard drive proof of concept, more than 3 years after its last effort

Tue, 03/25/2025 - 13:34
  • Seagate has debuted a new NVMe hard disk proof of concept
  • Prototype system pairs NVMe HDDs, SSDs, DPUs, and AIStore for AI workloads
  • NVMe HDDs use less power, with better efficiency, and reduced storage costs

In late 2021, Seagate unveiled a proof-of-concept hard disk drive that used the NVMe protocol and a PCIe interface - two technologies typically reserved for solid state drives.

Demonstrated at the Open Compute Project Summit in a custom JBOD enclosure with twelve 3.5-inch drives, the NVMe HDD featured a proprietary controller that supported SAS, SATA, and NVMe natively, without the need for a bridge.

Seen as a way to simplify data center infrastructure by unifying storage devices under a single interface, the drive promised performance improvements, lower TCO, and considerable energy savings.

Combined

Fast forward to GTC 2025, and Seagate has demonstrated a new proof-of-concept system combining NVMe HDDs and SSDs with Nvidia’s BlueField 3 DPU and AIStore software to show how NVMe can help address common storage challenges in AI environments.

While other vendors are reportedly exploring similar such concepts, Seagate appears to be the only firm showing off a functional system.

(Image credit: Seagate) Working with customers and partners

“Unlike SAS/SATA-based hard drives, NVMe hard drives remove the need for HBAs, protocol bridges, and additional SAS infrastructure, making AI storage more streamlined,” Seagate says.

“These drives allow AI workloads to scale seamlessly by integrating high-density hard drive storage with high-speed SSD caching in a unified NVMe architecture.”

The prototype Seagate showcased featured eight NVMe hard drives, four NVMe SSDs for caching, Nvidia BlueField DPUs, and AIStore software, all housed inside a hybrid array.

The team demonstrated that direct GPU-to-storage communication, via NVMe hard drives and DPUs, reduced latency in AI workflows. Eliminating legacy SAS/SATA overhead also simplified system architecture and improved storage efficiency.

“By using NVMe hard drives alongside SSDs, organizations will be able to optimize cost while maintaining performance, reserving SSDs for active datasets and using hard drives for long-term AI training data retention,” Seagate says.

From a design perspective, adding NVMe to HDDs potentially only requires a few changes, such as a PCIe interface and firmware updates, while retaining the familiar 3.5-inch form factor.

Compared to SSDs, Seagate says NVMe hard drives offer 10 times more efficient embodied carbon per terabyte, four times more efficient operating power consumption per terabyte, and lower cost per terabyte.

When, or indeed if, these drives will reach the market is anyone’s guess. Seagate says it is “working with customers and partners to explore how NVMe hard drives can fit into next-generation AI storage solutions,” but there’s no timeline for it as yet.

You might also like
Categories: Technology

Please, Apple, don't add a camera to the Apple Watch – it's not the change we're hoping for

Tue, 03/25/2025 - 13:30

Apple might want to put a camera or two on your next Apple Watch, ostensibly to assist its AI in interpreting your environment and, perhaps, acting on your behalf: "There's a hill up ahead! You might want to accelerate your running pace, but watch out for that puddle; it might be a pothole!"

That sounds useful, but do we need a smartwatch to do a job best left to our eyes? You'll see that hill, you'll take note of the puddle, and subconsciously plan a route around it. Why would you need a camera on your wrist?

Forgive me if I am a bit against the whole concept of a wearable camera. I think that unless you're a police officer who has to record all their interactions with the public (see The Rookie for details), a chest-bound camera is a bad idea. I think most Humane AI Pin wearers (and Humane AI) quickly discovered this.

Cameras on glasses aren't as bad, perhaps because they're so close to your eyes where you are looking at and making mental notes about what you see anyway. There are privacy concerns though, and when I've worn Ray-Ban Meta Smart Glasses, I've had a few people ask if I'm recording them. There's a little light on the frame that tells them as much, but I get the concern. No one wants to be recorded or have their picture taken without their explicit permission.

Never a good idea

We've seen cameras on smartwatches before. Back in 2013, Samsung unveiled the beefy Samsung Galaxy Gear, which I wore and reviewed. Samsung's idea for an on-wrist camera was, shall I say, unusual.

Instead of integrating the camera into the smart watch's body, Samsung stuffed it into the wristband. This was one bad idea on top of another. By placing the camera on the wristband, it forced you to position your wrist just right to capture a photo, using the smartwatch display as a viewfinder. Moreover, there was concern about damaging the wristband, which could lead to ruining the 2MP camera. It took, by the way, just passable photos.

A post shared by Lance Ulanoff (@lanceulanoff)

A photo posted by on

Apple's apparent idea for a smartwatch camera is less about capturing a decent photo and more about ambient awareness. Information that one or more cameras can glean about your environment could inform Apple Intelligence – assuming Apple Intelligence is, by then, what Apple's been promising all along.

Powerful AI works best with data, both training to build the models and real time for analysis by those same models. Our best iPhones and best smartwatches are full of sensors that tell these devices where they are, where they're going, how fast they're moving, and if you've taken a fall or been in a car crash while carrying or wearing them. The watch has no camera, and your phone does not use its camera to build a data picture unless you ask it to.

Currently, you can squeeze your Camera Control button on the iPhone 16 and enable Visual Intelligence. This lets you take a picture and ask ChatGPT or Google Search to analyze it.

An eye on your wrist

A camera on your smartwatch, though, might always be on and trying, even as you pump your arms during a brisk run, to tell you about what's around and in front of you.

It might be looking at the people running toward you, and could possibly identify people on the fly, assuming it can get a clear enough shot. The watch could then connect to your phone or AirPods and identify people: "That's Bob Smith. According to his LinkedIn, he works in real estate." I'm not sure how those other people would feel about that, though.

I get that some of this sounds very cool and futuristic, but are we really meant to know that much about everything around us? Wouldn't it be better to explore what we want to with our eyes and ignore the rest? Exactly how much information can a human take?

It needs this but...

There are no guarantees that this will happen. It's just a rumor from Bloomberg News, but it makes sense.

It's high time for Apple to do the first truly significant Apple Watch redesign in a decade. Apple also needs some exciting new technology to remind people it can still innovate. Plus, more hardware sensors open the door to more powerful Apple Intelligence, and with all the recent missteps in that space, Apple is in dire need of an AI win.

I'm fine with all of that, as long as it does not involve putting cameras on my Apple Watch.

You might also like
Categories: Technology

OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade

Tue, 03/25/2025 - 12:55

While it’s not another 12 days of news from OpenAI – or at least, we hope not – the company behind ChatGPT did have a quick live stream on March 25, 2025.

The news? Well, while the AI behemoth was tight-lipped in the lead-up, OpenAI did debut native image generation for the 4o model.

It makes the teaser image of someone writing “Livestream at 11AM PT” on a classic, dark green chalkboard make a lot more sense.

OpenAI's much-improved image generation skills are debuting shortly after Google added native image generation to Gemini inside its AI Studio.

Ahead, you can see TechRadar's live blog during the event as OpenAI CEO Sam Altman walked us through the news and updates since the stream wrapped of us putting the new feature to the test.

(Image credit: Future)

Well, the livestream title is shedding a lot more light as to watch we can expect ... way more than the intitally teased image. It's titled "4o Image Generation in ChatGPT and Sora" so that means we're likely getting improvements to creating images within ChatGPT and Sora.

The mention of the latter might mean more general improvements for text-to-video generation as well.

Under 15 minutes to go now!

OpenAI's live stream has begun, and in the lead-up to the 2PM ET / 11AM PT / 6PM GMT start time, we're being treated to various images. Some of these overlap, but it refreshes every few seconds and shows off all the different styles.

The live stream description notes we'll be hearing from Sam Altman, Gabriel Goh, Prafulla Dhariwal, Lu Liu, Allan Jabri, and Mengchao Zhong discussing 4o image generation.

(Image credit: Future) OpenAI debuts native image generation in the 4o model

(Image credit: Future)

And we're off to the races – Sam Altman is calling this one of the most fun advancments, and it's native image generation in the 4o model. He quickly noted 'it's a huge step forward' and something that OpenAI has been excited to rollout for quite some time, for a whole host of folks.

Altman notes the best way to explain it is to show it off, so we're already in a demo. In just a few seconds after the prompt, OpenAI showed off an image with what the team said has 'perfect text.' Seemingly showing a leap in terms of understanding the prompt and creating the image with clear text, and a unique point of view effect.

(Image credit: Future)

(Image credit: Future)

In the second demo, the OpenAI team took a selfie and then asked ChatGPT to make it into an 'anime style.' It took several seconds, but it did indeed generate what was requested. You can see it above.

Sam Altman was then quick to note that the improved image generation is starting to roll out now in ChatGPT and Sora for Pro users, and it will be available for free users as well.

We also are seeing the process of the native image generation model within the 4o model, turning that generated selfie into an "AGI meme."

(Image credit: Future)

Sam Altman also teased that the native image generation model within 4o is designed to be a little offensive within reason if that's what you direct it to. The key phrase there is "within reason," and no doubt many users will put that to the test.

Now, the second demo asks for a colorful image describing the theory of relativity, with some added humor. Altman also noted that the image generation model is a bit slower but that the result is much higher in quality.

(Image credit: Future)

Considering the improved image generation is already available – or at least rolling out – TechRadar's editor-at-large, Lance Ulanoff, already tested the feature.

Lance took a selfie and uploaded it to ChatGPT via the iPhone app. He then asked for it to be turned into anime style. The first time, it gave him a full head of hair, but then corrected when he asked for it to be bald.

(Image credit: Future/Lance Ulanoff)

(Image credit: Future)

Back to the live demos, OpenAI is showing that we can now chat with ChatGPT more visually. This means that you can ask for requests to images in a row, and it will remember the context.

In this example, a photo of a coin was sent, and then the team asked ChatGPT to make it transparent, among other requests.

(Image credit: Future) That was fast!

OpenAI certainly covered quite a bit of ground in just about 15~ minutes. Sam Altman and the team debuted native image generation in the 4o model. Then, presented some demos, and before it was wrapped, we already tested the feature in the ChatGPT app for the iPhone.

Now, as OpenAI announced, the improved model is rolling out now to Pro users, but is also coming to free users. Altman also confirmed it will eventually arrive in the API as well.

We just put image generation in the 4o model through another test, this time asking for a cartoon strip in the style of Charles Schulz's "Peanuts." While ChatGPT acknowledged the request, it turned it down due to copyright.

Instead, the resulting funny comic strip is in a similar style, with two familiar characters who have new names and other qualities to distinguish them from the original.

(Image credit: Future)
Categories: Technology

"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business

Tue, 03/25/2025 - 12:51

The head of OracleNetSuite has laid out his vision of getting business technology to work by ensuring your organization is connected as much as possible.

Speaking at the company's SuiteConnect London 2025 event, Evan Goldberg highlighted the importance of ensuring all your data is connected, noting how successful businesses don't work in silos.

"If you're a business leader in 2025, you probably feel pressure to get the most out of your technology - and you're not alone," he declared. "The best-run businesses operate in a unified way, with every function connected to every other."

Time for Suiteness

With NetSuite's platform offering such a wide array of accountancy and finance tools for businesses, Goldberg introduced the idea of "Suiteness" - by which all the elements of your suite work together, meaning all your data, your processes and teams are unified in one system.

This approach means users can get more insight by analyzing data together, but also see greater productivity benefits, as workflows are united from end to end and across departments, meaning your teams can truly collaborate because they're all working in the same system.

"(Suiteness) means you can achieve more in every department across your business," Goldberg concluded.

(Image credit: Oracle NetSuite)

Goldberg also noted how finance is critical for every area of a business, and this is why NetSuite was built to be, "an operating system for your entire business, not just a system for accounting or operations or HR or any single functional area."

"It's our job to deliver constant innovation, to let you get more out of the suite in every area of your organization,” Goldberg added.

“Our partnership with Oracle (means) we're able to deliver powerful enterprise-grade solutions, once available only to the largest organizations, at a scale and price that's appropriate for your organization."

AI was unsurprisingly at the heart of the company's latest innovation, with Nicky Tozer, Senior Vice President, EMEA, Oracle NetSuite, noting how AI "is no longer the tech of the future, it's here today."

The company also unveiled a host of AI tools and services centered around AI agents, including Text Enhance for custom fields, allowing for faster and more customized data entry, and a Financial Exception Management agent which can automatically detect any potential issues with suspicious transactions.

“Organizations in the UK are looking to AI to help them be more productive and do more with less, but knowing where to start can be overwhelming,” said Goldberg.

“With our AI built in, not bolted on and by offering it at no additional cost, NetSuite is helping customers reduce the barrier to entry and quickly and easily benefit from the latest advancements to gain deeper insights and boost efficiency.”

Categories: Technology

Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event

Tue, 03/25/2025 - 12:42
  • Apple's announced that WWDC 2025 will run from June 9 to June 13
  • The week-long developer conference will start with a special event on June 9
  • It should be the next big chance for Apple to provide an update on Apple Intelligence and for new software to be unveiled

We’ve all been expecting Apple’s next event to be in June, and the Cupertino-based tech behemoth just made it official. WWDC – aka World Wide Developers Conference – is returning, and the week-long affair will kick off with a special event on June 9, 2025.

It’s safe to say that Apple has a lot riding on the special event, as it will be almost a year to the day that Apple Intelligence was unveiled, and in the 365 days since then, there’s been a lot of news.

Most recently, Apple officially confirmed a delay with the AI-infused Siri and said it’ll arrive ‘in the coming year.’ We’re all expecting Apple – likely in the form of CEO Tim Cook or SVP of Software Craig Federghi – to give a state of the state of sorts on the feature set.

In typical Apple fashion, the company is tight-lipped about what to expect from WWDC 2025. We have a new graphic with “WWDC” in the iconic rainbow Apple colors, and the “25” at the end of the event logo has some dimension to it, potentially hinting that the rumored redesign of iOS, iPadOS, and macOS will take a page from VisionOS.

Apple's state of the state, and hopefully an update on Apple Intelligence

(Image credit: Future)

In the shared release, Apple teases that the week will “spotlight the latest advancements in Apple software,” likely hinting at the release of iOS 19, iPadOS 19, macOS – insert fun California-themed name – 16, watchOS 12, VisionOS 3, as well as new versions of tvOS and the OS’ for HomePod and HomePod mini.

Susan Prescott, Apple’s vice president of Worldwide Developer Relations, writes, “We’re excited to mark another incredible year of WWDC with our global developer community. We can’t wait to share the latest tools and technologies that will empower developers and help them continue to innovate” – certainly powering the hype train out of the station.

Greg Joswiak, Apple’s SVP of Marketing, took to X (formerly Twitter) to suggest we all save the week, hinting at a lot of news and sharing an animated version of the WWDC 25 logo that certainly has some bounce.

You’re gonna want to save the date for the week of June 9! #WWDC25 pic.twitter.com/gjzYZCkPbAMarch 25, 2025

As with previous years, WWDC 2025 will be available online and free for all registered developers, but there will be an in-person component happening at Apple Park in Cupertino, CA. This will be a chance for folks to watch the keynote and platforms' state of the union as well as take part in workshops. Space is limited, though, and registration is required. Regardless, TechRadar will have boots on the ground and be the place to be for the news as it breaks.

(Image credit: Future / Lance Ulanoff)

The real question, though, on our mind is how Apple Intelligence is positioned going forward, and what non-AI developments Apple has in store for the software that powers the iPhone, iPad, Mac, Apple Watch, Apple TV, Apple Vision Pro, and even AirPods.

Apple’s top team will need to explain where the AI-infused Siri is, how the timeline has shifted, and most importantly, how they will stick to it. The most recent report is that Mike Rockwell – the VP behind the Vision Pro and getting it to market – is now in charge of Siri, reporting directly to Craig Federghi.

Could we finally get a true redesign of iPadOS, making it more Mac-like and letting folks with an iPad Pro take advantage of the M4 chip? Will there be some impressive new Continuity features in the same vein as iPhone Mirroring? Might the redesign be as impressive and a garaguntan leap that pushes the appeal of Apple hardware?

The stakes are high, and I hope we’ll get some major news. But now we just have to wait 76 days – and counting – until Tim Cook takes the stage, says Good Morning, and hopefully provides more context around Apple Intelligence and the strange, strange rollout it’s taken.

You might also like
Categories: Technology

Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year

Tue, 03/25/2025 - 12:26
  • New changes to Hollow Knight: Silksong's Steam metadata have been discovered
  • The game's copyright has been updated to 2025 from 2019, and eligibility for Nvidia GeForce Now has been added
  • Fans are convinced the new copyright could mean a 2025 release date will be announced soon

Updates on Hollow Knight: Silksong have been few and far between for quite some time, but new changes to the game's Steam data have convinced fans that we'll finally hear more about it this year.

The discovery comes from SteamDB (via IGN), where several updates to the game's Steam listing were recorded. Among them is an update to change Silksong's copyright year from 2019 to 2025, eligibility for Nvidia's streaming platform, GeForce Now, and add new assets.

It's the changed copyright info that has fans excited and has sparked new speculation that the game could potentially launch sometime this year.

"This is the first copyright update in 6 years and also they added cloud gaming. This has to mean they’re getting close to launching the game right??" one user posted over on the game's subbreddit.

"This is it boys, it's been nice living in the silksanity for so long," said one user in response to a YouTube video detailing the news.

"Okay, all jokes aside, I genuinely believe that this might be the year..." another wrote.

Hollow Knight: Silksong was announced five years ago and is a sequel to the popular metroidvania Hollow Knight. The most recent trailer was released during the Xbox and Bethesda Games Showcase event in 2022.

Recent rumors suggest that a Nintendo Direct Showcase will air sometime this week, and if Hollow Knight: Silksong is launching this year, the broadcast could be the perfect place to announce a launch date and perhaps even a Switch 2 release.

You might also like...
Categories: Technology

OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora

Tue, 03/25/2025 - 11:31
  • OpenAI launches OpenAI Academy
  • The free resource has all the info you need on how to master ChatGPT and Sora
  • The AI bible includes live streams, videos, and in-person events

OpenAI just launched an incredible AI resource bible called OpenAI Academy, and it could be the catalyst for you to finally try ChatGPT.

Announced on the company's blog, OpenAI Academy is a publicly available, free online resource hub that will help "support AI literacy and help people from all backgrounds access tools, best practices, and peer insights to use AI more effectively and responsibly".

With in-person events, live streams, and content to explore at your own pace, the Academy could become your go-to resource for all things ChatGPT and Sora.

There are plenty of excellent AI resources on the internet. In fact, you're reading one just now. OpenAI Academy, however, gives users a go-to educational tool created by the makers of ChatGPT to help teach the right practices for using AI.

You can access OpenAI Academy without paying a dime; all you'll need to do is sign up for an account. You can access the resource here.

The perfect companion

AI is rapidly evolving and changing the way we interact with technology. As someone who writes about AI and uses it daily, OpenAI Academy is the kind of resource I've been waiting for.

Initially, OpenAI Academy launched as an in-person event, so it's fantastic to see the resources be made available to anyone with access to the internet.

From tips on how to get started with Sora and how to craft a storyboard, to how to create custom GPTs and use Deep Research in ChatGPT, there's a guide for almost all your needs.

Considering companies charge for educational courses on AI, OpenAI's offering here is a steal for free. So whether or not you use ChatGPT or Sora daily, or if you've been hesitant to try because it can be overwhelming, OpenAI Academy has you covered.

You might also like
Categories: Technology

Monster Hunter Wilds Title Update 1 launches in early April, adding new monsters and some of the best-looking armor sets I need to add to my collection

Tue, 03/25/2025 - 11:18
  • Capcom has announced that Monster Hunter Wilds Free Title Update 1 will arrive on April 3
  • The major content patch will add a new monster called Mizutsune, Arch-tempered Rey Dau, The Grand Hub, new gear sets, and more
  • Free Title Update 2 is confirmed for a Summer 2025 release and will see the return of Lagiacrus

Monster Hunter Wilds Free Title Update 1 will be released on April 3 and will introduce a buffet of new content, including the addition of a new monster.

The Monster Hunter Wilds Showcase kicked off today, where Capcom gave fans the first look at the game's first major content patch while also teasing its Summer update and the return of a familiar monster.

Kicking things off with one of the most notable announcements of the broadcast, the upcoming update will introduce a brand new monster called Mizutsune, a water-element beast that can be unlocked at Hunter Rank 21 and can be found in the Scarlet Forest.

We didn't get a ton of information about Mizutsune, but from a short clip, we know that it will use giant bubbles and a spraying attack from its mouth to counter the player at long range.

Players at Hunter Rank 50 and above will also be able to take on Arch-tempered Rey Dau on April 29, and Zoh Sia can be fought once again at Hunter Rank 50 when the patch drops. All three monsters will each drop materials that can be used to craft brand-new armor sets, and every single one of them looks amazing.

Another new feature arriving with Title Update 1 is The Grand Hub, a larger, interactive gathering space for players that can be unlocked at Rank 16, featuring a new Barrel Bowling mini-game with rewards, arm wrestling, and night-time performances from the Diva.

Arena Quests will finally be implemented, too, allowing players to compete with other Hunters online for the fastest completion times.

Challenge Quests and Free Challenge Quests will also be available as limited-time Event Quests, the latter of which requires no equipment limits and allows up to four players.

Capcom has confirmed that every season, celebrations will be held at The Grand Hub, with the first celebration of Spring, the Festival of Accord: Blossomdance, to be released on April 23.

During seasonal events, the appearance of The Grand Hub and available meals will change, and players can obtain limited equipment, gestures, pop-up camp decorations, and more.

In addition to seasonal event quests, "most previous event quests will also make a return", but it's unclear which ones right now.

Alongside the release of free downloadable content (DLC) packs that feature new gestures, players will also be able to change Alma's outfit for free. Accessing the customisation tab in the game's menu will allow players to equip Alma with her new outfit and, after completing a certain side mission, Alma's glasses will also be changeable.

Capcom shared a look at the game's roadmap, which revealed that a new Capcom collaboration and "additional features" will arrive at the end of May.

At the end of the showcase, it was also announced that Title Update 2 is planned to arrive in Summer 2025, with a short sneak peek teasing the return of Lagiacrus, a monster that has been featured in many past Monster Hunter games.

You might also like...
Categories: Technology

Chinese government hackers allegedly spent years undetected in foreign phone networks

Tue, 03/25/2025 - 11:04
  • Security researchers Sygnia discover attack after responding to a separate incident
  • The attack was attributed to a Chinese state-sponsored threat actor
  • Weaver Ant group lurked for years, stealing sensitive data and moving laterally

Chinese state-sponsored threat actors allegedly spent four years lurking in the IT infrastructure of a “major” Asian telecommunications provider, according to cybersecurity researchers Sygnia, which discovered the cyber-espionage campaign after responding to a separate incident.

In a technical writeup, Sygnia said while investigating a separate forensic case, multiple security alerts flagged suspicious activity. Furthermore, a previously disabled account was re-enabled, raising even more suspicion.

Digging deeper, the investigators found China Chopper web shells, as well as multiple other malicious payloads used for lateral movement and data exfiltration.

Monitor your credit score with TransUnion starting at $29.95/month

TransUnion is a credit monitoring service that helps you stay on top of your financial health. With real-time alerts, credit score tracking, and identity theft protection, it ensures you never miss important changes. You'll benefit from a customizable online interface with clear insights into your credit profile. Businesses also benefit from TransUnion’s advanced risk assessment tools.

Preferred partner (What does this mean?)View Deal

"Incredibly dangerous"

They concluded that the threat actors, named Weaver Ant, were Chinese, since their operational tactics, the use of China Chopper, ORB networks, and other tools, their working hours, and the choice of target (critical telecom infrastructure), all pointed to that conclusion.

Sygnia did not want to disclose who that “major” Asian telecommunications company is, but said that the initial access vectors were vulnerable Zyxel routers.

Furthermore, the company added other Southeast Asian telecom providers as victims, as well, since their compromised Zyxel routers were used in the attack.

Weaver Ant managed to successfully maintain long-term access, exfiltrate sensitive data, while moving laterally across the company’s systems, Sygnia concluded. The goal was espionage - to gather as much intelligence as possible, from critical infrastructure.

Despite multiple attempts to remove them, Weaver Ant managed to persist, it was concluded.

“Nation-state threat actors like Weaver Ant are incredibly dangerous and persistent with the primary goal of infiltrating critical infrastructure and collecting as much information as they can before being discovered,” said Oren Biderman, incident response leader at Sygnia.

“Weaver Ant maintained activity within the compromised network for over four years despite repeated attempts to eliminate them from compromised systems. The threat actor adapted their [tactics] to the evolving network environment, enabling continuous access to compromised systems and the collection of sensitive information.”

Via The Record

You might also like
Categories: Technology

Sony WF-C710 earbuds land, and I think they'll be the 2025 budget buds to beat

Tue, 03/25/2025 - 11:00
  • Sony earbuds to replace the budget-belter WF-C700N have launched
  • The new WF-C710N buds bring wearer detection and improved battery life
  • …Oh, and a stunning 'glass blue' transparent colorway

It's unlikely you'll have missed the excellent Sony WF-C700N earbuds. They sat atop TechRadar's best budget earbuds list for over a year following their release in April 2023, until the Nothing Ear (a) swept in a whole 13 months later and after much deliberation – including a Nothing Ear (a) versus Sony WF-C700N feature – we agreed Nothing's option should take their spot.

But as of today, there's a new Sony kid in town: Sony WF-C710N – so, er, 10 more than the older model (it is difficult to understand Sony's monikers; I find it best to nod slightly, as we did with the cheap and very-good-but-devoid-of-ANC Sony WF-C510, and move on). The point is, they're here to supersede the Sony WF-C700N, and that 'N' definitely means 'noise cancellation'.

Before we get into the specs though, let's talk about that all-new 'Blue Glass' colorway in addition to black, white, and pink finishes. It is transparent like sea glass and for anyone who remembers Nothing laboring the point of its mostly-transparent stems and driver housing, this seems oh-so effortless…

Sony WF-C710N specs and features

(Image credit: Sony)

So what are the upgrades? First off, the stamina: without ANC deployed Sony tells me you can expect a 40-hour total battery life, or 12 hours from the buds and a further 28 from the case. With noise-canceling on, it's 8.5 hours and 21.5 hours in the case, or a 30-hour battery total before you need a USB-C charger. It's a huge step up from the 20 hours without ANC (or 15 with it) total battery life you'd get from the outgoing model.

Next, there's a new Sony companion app called 'Sound Connect' that, in addition to Sony's five-band EQ tab, adds a feature called 'Find My Equaliser'. This plays various tracks to you and asks you to pick a favorite of five EQ presets, to create a custom profile tuned to your ears.

Also on the new-for-WF-C710N list is wearer detection, which is something we really wanted to see in the Sony WF-C710N, because it means they'll pause the audio when you remove one and resume it when you put it back in your ear.

Elsewhere, on-ear touch controls are back including volume tweaks, playback, access to noise-cancelling profiles, hands-free summoning of Gemini or Siri plus Quick Attention, which means that by covering one earbud, playback is cut and your mics are amplified to better hear the person who just disturbed you at your desk. (It's a great feature. I love it, really… )

On those mics, you now get two per bud with a new AI-enhanced 'dual noise sensor technology' to pick out and amplify your voice while nixing extraneous noise in calls. Said mics also now feature a special wind-noise reduction mesh. There's also multi-point to two devices, adaptive sound control for ANC, Sony's 360 Reality Audio solution (but do remember, Tidal sadly no longer supports the format) and Sony's entry-level DSEE upscaler to make even lowly Spotify streams sound closer to the real thing.

The 5mm driver unit appears unchanged, however, and although there's a Bluetooth 5.3 chipset, at launch the WF-C710N will not support Auracast audio broadcasts at airports and dental surgeries – when those arrive. There's also no higher-resolution LDAC support (your codec support here is limited to SBC and AAC) and your ear tip selection is limited to just three sizes (small, medium, and large), however, I found their elder siblings some of the best earbuds for smaller ears, so since the driver-size and earpiece dimensions here seem largely unchanged, I'm not particularly worried about the fit.

Pricing? Certainly. The Sony WF-C710N earbuds are priced at £100 or €120 (so just £1 more than the WF-C700N), which translates to around $129 or AU$205, although these last two prices are unofficial.

How good are they and should you rush out and buy a set? I'm working on a full review, and I'll let you know soon…

(Image credit: Sony) You may also like
Categories: Technology

Pages