News
Third-party attacks are one of the most prominent trends within the threat landscape, showing no signs of slowing down, as demonstrated by recent high-profile cyber incidents in the retail sector.
Third-party attacks are very attractive to cybercriminals: threat actors drastically increase their chances of success and return on investment by exploiting their victims’ supplier networks or open-source technology that numerous organizations rely on.
A supply chain attack is one attack with multiple victims, with exponentially growing costs for the those within the supply chain as well as significant financial, operational and reputational risk for their customers.
In a nutshell, in the era of digitization, IT automation and outsourcing, third-party risk is impossible to eliminate.
Global, multi-tiered and more complex supply chainsWith supply chains becoming global, multi-tiered and more complex than they have ever been, third-party risks are increasingly hard to understand.
Supply chain attacks can be extremely sophisticated, hard to detect and hard to prevent. Sometimes the most innocuous utilities can be used to initiate a wide-scale attack. Vulnerable software components that modern IT infrastructures run on are difficult to identify and secure.
So, what can organizations do to improve their defenses against third-party risk? We have outlined three areas organizations can take to build meaningful resilience against third-party cyber risk:
1. Identify and mitigate potential vulnerabilities across the supply chainUnderstanding third-party risk is a significant step towards its reduction. This involves several practical steps, such as:
i) Define responsibility for supply chain cyber risk management ownership. This role often falls between two stools - the internal security teams who will focus primarily on protecting the customer, while the compliance and third-party risk management programs who own responsibility for third party risk and conduct, but don’t feel confident addressing cyber risks given their technical bias.
ii) Identify, inventory and categorize third parties, to determine the most critical supplier relationships. From a cyber security perspective, it is important to identify suppliers who have access to your data, access into your environment, those who manage components of your IT management, those who provide critical software, and – last but not least – those suppliers who have an operational impact on your business.
This is a challenging task, especially for large organizations with complex supply chains, and often requires security teams to work together with procurement, finance and other business teams to identify the entire universe of supplier relationships, then filter out those out of scope from a cyber security perspective.
Assess risk exposure by understanding the security controls suppliers deploy within their estate or the security practices they follow during the software development process, and highlight potential gaps. It is important to follow this up with agreement on the remediation actions acceptable to both sides, and to work towards their satisfactory closure. The reality is that suppliers are not always able to implement the security controls their clients require.
Sometimes this leads to client organizations implementing additional resilience measures in-house instead – often dependent on the strength of the relationship and the nature of the security gaps.
Move away from point-in-time assessments to continuous monitoring, utilizing automation and open-source intelligence to enrich the control assessment process. In practice, this may involve identifying suppliers’ attack surfaces and vulnerable externally-facing assets, monitoring for changes of ownership, identifying indicators of data leaks and incidents affecting critical third parties, and monitoring for new subcontractor relationships.
2. Prepare for supply chain compromise scenariosRegrettably, even mature organizations with developed third-party risk management programs get compromised.
Supply chain attacks have led to some of the most striking headlines about cyber hacks in recent years and are increasingly becoming the method of choice for criminals who want to hit as many victims as possible, as well as for sophisticated actors who want to remain undetected while they access sensitive data.
Preparedness and resilience are quickly becoming essential tools in the kit bag of organizations relying on critical third parties.
In practice, the measures that organizations can introduce to prepare for third-party compromise include:
i) Including suppliers in your business continuity plans. For important business processes that rely on critical suppliers or third-party technology, understand the business impact, data recovery time and point objectives, workarounds, and recovery options available to continue operating during a disruption.
ii) Exercising cyber-attack scenarios with critical third parties in order to develop muscle memory and effective ways of working during a cyber attack that may affect both the third party and the client. Ensure both sides have access to the right points of contact – and their deputies – to report an incident and work together on recovery in a high-pressure situation.
iii) Introducing redundancies across the supply chain to eliminate single points of failure. This is a difficult task, especially in relation to legacy suppliers providing unique services or products. However, understanding your options and available substitutes will reduce dependency on suppliers and provide access to workarounds during disruptive events such as a supply chain compromise.
3. Secure your own estate (monitor third-party access, contractual obligations)Protecting your own estate is as important as reducing exposure to third-party risk. Strengthening your internal defenses to mitigate damage if a third party is compromised involves a number of important good practice measures, including but not limited to:
i) Enhanced security monitoring of third-party user activity on your network,
ii) Regular review of access permissions granted to third-party users across your network, including timely termination of leavers,
iii) Continuous identification and monitoring of your own external attack surface, including new internet-facing assets and vulnerable remote access methods,
iv) Employee security training and social engineering awareness, including implementation of additional security verification procedures to prevent impersonation of employees and third parties.
Security vetting of third-party users with access to your environment or dataAs third-party threats evolve and become more prominent, organizations must have a clear view of who they’re connected to and the risks those connections pose. An end-to-end approach to cyber due diligence, encompassing assessment, monitoring, and response capabilities to threats across their supply chains before damage is done.
Third-party risk will remain a challenge for many organizations for years to come, especially as more threat actor groups begin to explore supply chain compromise as an attractive tactic, offering high rewards with relatively low resistance.
Regulators across all sectors are beginning to pay greater attention to supply chain security. Frameworks such as DORA, NIS2 and the Cyber Resilience Act reflect the growing concerns that supply chain security must be a key component of digital strategy. Those who lead on this issue will be best placed to navigate supply chain compromise.
We list the best identity management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
What's better than wireless charging? Even faster wireless charging. The latest Qi2.2 wireless charging standard makes wireless power much faster, much smarter and even more useful – and while several brands have recently obtained Qi2.2 certification, Baseus is the first to publicly release visuals and detailed specifications of three certified devices. So while others make promises, Baseus is already making Qi2.2 products.
That means Baseus customers will be among the very first people to get a massive wireless power-up.
The AM52 is a super-slim power bank with speedy 25W wireless charging (Image credit: Baseus)Why Qi2.2 is brilliant news for youQi2.2 is the very latest version of the world's favourite wireless charging standard. Qi charging is supported by all the big names in smartphones and accessories, delivering convenient and safe wireless charging for all kinds of devices. And the latest version is the best yet. Qi2.2 is much faster, even more efficient and even safer.
There are three key parts to Qi2.2: supercharged wireless power, smarter heat control and magnetic precision. The first means that instead of maxing out at 15W of power like existing wireless chargers do, Qi2.2 can push the limit to 25W. That means much faster charging and less time waiting: Qi2.2 can charge your phone up to 67% faster than Qi2.0.
Wireless charging generates heat, and Qi2.2 keeps that down with next-generation thermal regulation, stricter surface temperature limits and improved coils. And the new Magnetic Power Profile (MPP) built into the standard ensures more precise alignment with your phone, reducing energy waste and improving charging efficiency by 15% whether you're charging in the car, at home or on the go.
The powerful PicoGo AM61 comes with its own USB-C cable so you can charge wired and wirelessly at the same time. (Image credit: Baseus)Qi2.2 is made for everything everywhereQi2.2 is made to work across all kinds of devices from the iPhone 12 and endless Androids to future models that haven't even been made yet. And while it's focused on the future it's also fully backwards compatible: your Baseus Qi2.2 power bank or charger will happily power up a device made for older Qi standards, and Qi phone cases can add wireless charging capability to older phones that weren't built with wireless charging inside.
Baseus is the industry leader in Qi2.2 charging, and it's just launched three new products that take full advantage of Qi2.2's extra power and improved efficiency: two powerful PicoGo magnetic power banks for any device and a really useful foldable 3-in-1 PicoGo charger for your phone, earbuds and smartwatch.
The two magnetic power banks are the PicoGo AM61 Magnetic Power Bank and the PicoGo AM52 Ultra-Slim Magnetic Power Bank. Both versions deliver a massive 10,000mAh of power, both have a 45W USB-C charging port so you can charge two things at once, and both can charge your device wirelessly at up to 25W via the new Qi2.2 standard without any danger of overheating.
The AM52's ultra-slim design features a graphene and aluminium shell for heat dissipation and smart temperature control that protects all of your devices while charging, and the slightly larger AM61includes a built-in USB-C cable for extra convenience.
If you're looking for a super-speedy compact charger, you'll love the PicoGo AF21 foldable 3-in-1 wireless charger. It delivers the same super-fast 25W wireless charging as its siblings, and with a total 35W of power across its three modules it can wirelessly power up not just your phone but your earbuds and smartwatch too.
That makes it an ideal bedside charger as well as a great travel charger: it’s extremely small at just 75.5 x 80 x 38.11am and it’s highly adjustable for optimal viewing and charging. You can rotate the watch panel 180º, adjust the phone panel through 115 degrees and adjust the base bracket too.
The PicoGo AF21 foldable 3-in-1 wireless charger is super-portable and extremely adjustable. (Image credit: Baseus)Ride the next wireless wave with Baseus' brilliant power-upsBaseus is setting the standard for Qi2.2 wireless charging, and whether you grab the powerful dual-charging PicoGo AM61, the super-slim PicoGo AM52 or the multi-talented PicoGo AF21 charger you're getting the latest, greatest and fastest charging for your phone. With Qi2.2 Baseus isn't just riding the next wireless wave. It's shaping it.
The Baseus PicoGo AM61 Magnetic Power Bank, PicoGo AM52 Magnetic Power Bank and PicoGo AF21 3-in-1 Foldable 3-in-1 Wireless Charger will all be available this August, and you'll be able to order them directly from Baseus’s website and from major retailers such as Amazon.
- Microsoft names three Chinese hacking groups it claims were abusing recently discovered flaws in SharePoint
- Hackers were apparently able to access sensitive data
- The company is confident the attacks will keep coming until the systems are patched
At least three major Chinese hacking groups were abusing recently discovered vulnerabilities to target businesses using Microsoft SharePoint, the company has said.
Microsoft recently released an urgent patch to fix two zero-day vulnerabilities affecting on-premises SharePoint servers, tracked as CVE-2025-49704 (a remote code execution bug), and CVE-2025-49706 (a spoofing vulnerability), which were being abused in the wild.
Now, Microsoft is saying that the groups targeting the flaws are Chinese state-sponsored groups - namely Linen Typhoon, Violet Typhoon, and Storm-2603.
Get Keeper's Personal Password Manager plan for just $1.67/month
Keeper is a password manager with top-notch security. It's fast, full-featured, and offers a robust web interface. The Personal Plan gets you unlimited password storage across all your devices, auto-login & autofill to save time, secure password sharing with trusted contacts, biometric login & 2FA for added security.View Deal
Two typhoons and a stormThe first two are part of the larger “typhoon” operation, counting at least half a dozen organizations, including Brass Typhoon, Salt Typhoon, Volt Typhoon, and Silk Typhoon.
In the last couple of years, these groups were attributed with breaches into critical infrastructure organizations, government, defense, and military firms, telecom operators, and similar businesses, across the western world and NATO members.
Some researchers are saying that these groups were tasked with persisting in the target networks, in case the standoff between the US and China over Taiwan escalates into actual war. That way, they would be able to disrupt or destroy critical infrastructure, eavesdrop on important conversations, and thus gain the upper hand in the conflict.
At least seven major telecommunications operators in the United States have recently confirmed discovering Typhoon operatives on their networks and removing them from the virtual premises.
"Investigations into other actors also using these exploits are still ongoing," Microsoft said in a blog post, stressing that the attackers will definitely continue targeting unpatched systems.
SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Server 2016 were said to be affected. SharePoint Online (Microsoft 365) was secure.
Microsoft recommends customers to use supported versions of on-premises SharePoint servers with the latest security updates immediately, and says users should ensure their antivirus and endpoint protection tools are up to date.
You might also like- Microsoft releases urgent SharePoint security flaw patches - here's what you need to know, and how to update
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers
- Leaked renders have shown the Pixel 10 Pro and Pixel 10 Pro XL in four shades
- These include Obsidian, Porcelain, Moonstone, and Jade
- Two of these are far more interesting than the other two
It’s looking likely that you’ll be able to buy the Google Pixel 10 Pro and the Pixel 10 Pro XL in a choice of Obsidian (black), Porcelain (white), Moonstone (slate blue-gray), and Jade (a soft pistachio green with gold accents), as not only have some of these Pixel 10 colors been mentioned before, but now all four have been shown off in leaked renders.
Android Headlines has shared what it claims are official renders of the Pixel 10 Pro and the Pixel 10 Pro XL in these four shades, and while we’d take this leak with a pinch of salt, these certainly look to be high-quality images, so they may well be official.
If these renders are accurate, then the Pro models will be available in two fairly plain, ordinary shades, in the case of Obsidian and Porcelain, since they’re basically just black and white. But the other two options are a bit more interesting.
Image 1 of 2Leaked renders of the Pixel 10 Pro in four colors (Image credit: Android Headlines)Image 2 of 2Leaked renders of the Pixel 10 Pro XL in four colors (Image credit: Android Headlines)A bit more colorThere’s Moonstone, which we’ve actually seen the Pixel 10 Pro in already via an official teaser. This is rather understated, but the hint of blue in it makes this more interesting than a pure gray option.
The highlight, though, is arguably Jade – it’s a soft, delicate shade that still somewhat fits with the rest of the color options, but is a bit brighter and more unusual. Really, we’d like to see more of this sort of thing, rather than top-end phones defaulting to plain shades, but at least there’s one option here for those who want a splash of color.
We’ll find out how accurate this color leak is soon, as Google is set to unveil the Pixel 10 series on August 20. We’re expecting to see the Pixel 10 itself along with the Pixel 10 Pro, the Pixel 10 Pro XL, and the Pixel 10 Pro Fold, so there should be a lot to look forward to.
You might also like- Running an old OS like Windows 10 could soon pose cybersecurity issues
- Upgrading could reveal software compatibility issues, report notes
- The clock is now ticking to avoid a rushed Windows 11 migration
New research has uncovered some of the finer details around why many businesses are still being cautious with their approach to Windows 11 migration, with security threats and financial impacts proving to be major hurdles.
The report from Panasonic found nearly two-thirds (62%) of devices need replacing or upgrading for Windows 11 compatibility, highlighting the scale of the problem – a figure that rises to 76% among larger organizations with 5,000+ employees.
However, despite migration-related concerns, the study claims many organizations still recognize the benefits of upgrading from Windows 10 and older operating systems.
Businesses still have some concerns about upgrading WindowsPanasonic found 94% fear increased ransomware and malware risks if they don't upgrade, with 93% also concerned about data breaches. But two in three noted overall higher costs associated with migrating to Windows 11, with 55% stating that it could add to cybersecurity expenses.
Nearly half also noted software compatibility issues (47%) and productivity loss during downtime (45%), and for many (25%), hardware upgrades come with software upgrades, compounding the financial impact of OS upgrades.
However, with Microsoft estimating that ESU could cost around £320,000 over three years for 1,000 devices, the need to upgrade is clear.
Around a third each acknowledge that upgrading will give them better performance and processing power (36%), a more future proof ecosystem (36%) and access to AI features like Microsoft Copilot (34%).
Panasonic TOUGHBOOK Europe Head of Go-to-Market Chris Turner commented: "The window is closing for organisations to make a well-planned, measured and cost-effective transition to Windows 11 and start unlocking its benefits."
"Organisations that are still to undertake Windows 11 migration need support to ensure their deployment is not rushed and risky," Turner added.
You might also like- Windows 10 users who don’t want to upgrade to Windows 11 get new lifeline from Microsoft
- We've listed the best business laptops and best mobile workstations for the best portable upgrades
- Check out our roundup of the best productivity software
- PayPal World will enable users to pay using their domestic wallets
- PayPal/Venmo, NPCI, Tenpin and Mercado Pago join forces
- The system works with open source APIs, so should be easily expandable
PayPal has launched a new platform in the hope of simplifying cross-border commerce by connecting major digital wallets and payment system to facilitate multi-currency transactions.
With PayPal World, users will be able to pay internationally using their domestic wallets and payment methods.
With over two billion users targeted globally, the new platform is expected to land in Fall 2025, but only select countries will be able to benefit from easier cross-border payments at launch.
PayPal WorldFrom launch, PayPal World will work with Mercado Pago (Mexico), NPCI International Payments (India), PayPal (US), Tenpin Global (China) and Venmo (US).
"For much of the world’s population, international shopping and money transfers are not just difficult, at times they are impossible," the company noted in a press release.
The platform uses open source APIs to make it easy for more wallets to get onboard and boost interoperability in the future, but PayPal didn't mention any companies that could be joining its World platform beyond the initial launch partners.
"The challenge of moving money across borders is incredibly complex, and yet this platform will make it so simple for nearly two billion consumers and businesses," PayPal CEO Alex Chriss noted.
PayPal gave some examples of how global customers could use its new platform, including international visitors in China being able to scan their PayPal app with a merchant that accepts Weixin Pay, and UPI users in India being able to pay with their local wallet on an American ecommerce site.
NPCI International Payments CEO Ritesh Shukla welcomed the new platform, adding that it "aligns with [NPCI's] vision to make cross-border payments more seamless, secure, and inclusive."
"In addition to payments, Tenpay Global will deepen its collaboration with PayPal World in remittances," Tenpin Global CEO Wenhui Yang added.
You might also like- This PayPal scam exploits new address feature to send out phishing scam emails
- These are the best payment gateways to support your shop
- We've listed all of the best money transfer apps
The AI hype felt relentless in 2023/24. While the initial frenzy has subsided somewhat, executives and professionals now grapple with the reality of deploying Artificial Intelligence (AI), specifically Generative AI (GenAI), within their organization.
LLMs (Large Language Models), the technology behind popular GenAI chatbots, are powerful, but there remains a significant disconnect between the perception of what they can do and their practical application for business writing.
Easy to use interfaces like ChatGPT make GenAI seem like it "can literally do anything".
This is a dangerous misconception. While incredibly useful for certain tasks, GenAI chatbots can be totally useless, and even harmful when not used appropriately.
Fundamental differencesThe fundamental difference lies in how GenAI works compared to traditional software.
1. Traditional software is deterministic
It follows fixed logic and algorithms, producing the exact same, 100% accurate, and therefore repeatable result every time you give it the same input. Think of hitting CTRL+F in Word – you get a precise, repeatable count of a term.
2. Generative AI is non-deterministic
LLMs predict the next word based on probabilities from their training data. This means asking the same question twice will often give you different answers. They are designed to be variable.
Critical characteristics to understandThis core difference results in two critical characteristics businesses must understand:
1. Hallucinations: GenAI can confidently generate incorrect information or make things up. This isn't a bug; it's how the technology works. It's guessing based on patterns, not verifying facts. Copilot, for example, can wildly miscalculate readability scores or miss most instances of a search term.
2. Lack of Repeatability: You simply cannot guarantee the same output from the same prompt.
Here is the absolute critical takeaway: if your writing or document review task requires 100% accuracy or 100% repeatability, you must use deterministic software, not GenAI. Using GenAI for tasks demanding precision is a classic case of wielding a "GenAI hammer" and seeing every problem as a nail.
Flaws and errors in practiseConsider the disastrous consequences. I’ve used MS Copilot to search for every instance of "cybersecurity" in a contract for compliance purposes, only for the GenAI tool to miss 23 out of 27 occurrences. Trying to "shred" a document line-by-line into an Excel matrix for compliance, a task requiring perfect repeatability, is another inappropriate use case where GenAI will fail.
For businesses, especially in regulated sectors, using GenAI for tasks where factual accuracy is paramount is dangerous. Users may trust outputs due to brand credibility, not realizing the risks of inaccuracy.
Real-world failures like Air Canada's chatbot providing false information resulting in a lawsuit underscore the significant brand and trust damage inaccurate GenAI can cause.
So, where IS GenAI useful for business writing?GenAI thrives for tasks where variability, creativity, or a "good enough" answer is acceptable or desired.
Appropriate use cases include:
- First Draft Creation: Generating initial versions of documents like management plans, executive summaries, or proposal sections based on context. This can save significant time.
- Creative Assistance: Rewriting content in a different tone or style.
- Summarization: Condensing lengthy documents.
- Simplification/Rephrasing: Making complex text more accessible or refining paragraphs.
- Research & Analysis: Using public data for competitive analysis or sales research where perfect accuracy on every detail isn't required for generating insights. Using NLP (another type of AI) for thematic analysis across communications to check message consistency.
Beyond simple chatbots, the real value often lies in specialized applications. These layer GenAI into workflows for specific jobs, intelligently combining GenAI for creative/drafting tasks with deterministic software for accuracy-critical functions like readability scoring or compliance checks.
They understand the "job to be done" and apply the right technology. NotebookLM, which generates audio summaries of documents, is a great example of a focused application.
Garbage In, Garbage Out: The Unsexy Truth of Knowledge ManagementGenerative AI, even when combined with techniques like Retrieval Augmented Generation (RAG) to access proprietary data, is not a magic wand that can overcome poor data quality. The old adage "garbage in, garbage out" is more relevant than ever. If your internal knowledge bases are a mess of outdated content, multiple revisions, and poorly tagged documents, the AI's output will reflect that chaos.
As the Harvard Business Review noted, "Companies need to address data integration and mastering before attempting to access data with generative AI". Good data hygiene – clear folder structures, naming conventions, and processes for maintaining content – is crucial but is fundamentally a human behavior problem, not just a tech one. Investing in proper knowledge management now will pay dividends when you roll out any GenAI solution.
Data Security: The Enterprise Achilles' HeelMany popular AI chatbots rely on public cloud-based LLMs. For businesses, especially those in regulated industries like defense, finance, and healthcare, feeding proprietary or sensitive or PII (Personally Identifiable Information) data into these public models poses a significant security risk. CISOs (Chief Information Security Officers) are rightly wary, often blocking interactions with such models entirely.
The safer path for enterprises involves hosting LLMs in a private cloud or on-premise, fully locked down behind the firewall. The rise of powerful open-source models like Llama 4 or Mistral Nemo which can be deployed securely in-house, is a welcome trend. This shift is so significant that a Barclays CIO survey last year indicated 83% plan to repatriate some workloads from the public cloud, largely driven by AI considerations.
The Real Driver: People and ProcessMost AI projects fail not due to the technology, but because of people, process, security, and data issues. Lack of buy-in, poor strategy, inadequate data, and insufficient change management and user education are common pitfalls.
Deploying AI chatbots without teaching users about:
- Hallucinations
- The need to verify outputs
- Effective prompting
- Crucially, what tasks not to use GenAI for
...will lead to frustration and project failure.
Start with the business problem you need to solve, then map the appropriate technology to that job. Don't just chase the "shiny new tech". Define your goals, measure success (both quantitative and qualitative), and involve end-users early.
When evaluating vendors, look beyond captivating demos. Ask pointed questions about accuracy, repeatability, data handling, security posture, and their understanding of your specific use cases and industry needs. Always try before you buy and vet vendors carefully. Be wary of vendors who overpromise or claim GenAI can do everything.
In summary, popular AI chatbots offer exciting capabilities, but they are not magic. They are powerful tools with significant limitations. Successful businesses will adopt a pragmatic, thoughtful approach: understanding GenAI's non-deterministic nature, applying it strategically to appropriate tasks (like creative drafting), leveraging hybrid applications, investing in data quality and security, and crucially, focusing on the people and processes required for effective adoption and change management.
This is the path to truly unlocking AI's value.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
If you’re going to watch The Fantastic Four: First Steps during its opening weekend, you’ll also be able to catch the very first trailer for Avatar 3 (better known as Avatar: Fire and Ash). As if I didn’t think my job could get any better, I was treated to an exclusive first look at what’s to come in the next installment of James Cameron’s smash-hit sci-fi series, in 3D, with a cocktail shaped like a delicious fiery explosion.
It was a similar fanfare for the release of The Way of Water, but I still couldn’t believe what I was seeing. Objectively, it seemed absurd for a trailer to have its own launch event, but as soon as the lights went down and I put my 3D glasses on, I completely understood why. Even in a matter of minutes, Cameron creates something so majestic, something so beautiful that stops time itself, that you can’t do anything other than sit back in amazement.
Obviously, I’m not going to tell you any specific details about the scenes in the Avatar 3 trailer – you’ll need to trust me when I say you need to see it to believe it. But I can tell you more about what to expect, and when you need to pay extra attention in order to work out what’s to come when the full film is released on December 19, 2025.
The Avatar 3 trailer is going to blow your mind, and the action is about to get a lot darkerNeytiri (Zoe Saldaña) in Avatar 3. (Image credit: 20th Century Studios)Here’s the genius about the Avatar 3 trailer launch. I watched the footage through, in 3D, three times, and I still haven’t got the vaguest idea what the core storyline actually is. Essentially, this means the trailer is functioning as it should, not giving away everything we’re going to see in the full film, but simply alluding to it instead. But even if you can’t remember the ins and outs of Na'vi lore, it only takes a few seconds to work out that the next installment is going to be a lot darker.
As we already know, conflict on Pandora is about to escalate once again, with Sully (Sam Worthington), Neytiri (Zoe Saldaña) and the rest of the family encountering the aggressive Mangkwan Clan for the first time. They’re the “fire Na'vi,” and they’re viciously on the offensive from the moment they arrive in the trailer. We don’t know what their backstory is or why they have such an issue with outsiders, but as the trailer confirms, the meeting isn’t going to end in flowers and rainbows.
While the two Na'vi clans battle it out, Pandora itself has never looked more jaw-dropping. You can expect some ridiculously beautiful set pieces from Cameron in the trailer, elevating the 3D experience we got back in The Way of Water. It boggles the mind to think how they got there, but somehow, Cameron and his creative team has made something more visually astonishing that anything we’ve ever seen before.
What you need to watch out forSully (Sam Worthington) in Avatar 3. (Image credit: 20th Century Studios)Even though I was as busy as everyone else getting lost in the wonder of Pandora, there was a particular scene that caught my attention, and potentially has the power to change everything we know about the Avatar franchise. Blink and you’ll miss it, because it’s on screen for less than a full second. Again, no outright spoilers here, but all you need to know is that the only familiar character involved in this fleeting moment is Sully.
From the first Avatar movie, we’ve known there’s a huge human element in Pandora’s world now, and you only need to look at Sully himself to understand how that’s adapted over time. However, it’s easy to forget that presence in Avatar 2, shifting the worldbuilding focus to different Na'vi tribes coming into contact. All I’ll say is that Avatar 3 has the power to bring the Na'vi vs. Na'vi vs. humans hate triangle back into play, all by introducing an entirely new perception of human popular culture into the mix (you’ll know it when you see it, I promise).
If 3D isn’t your thing, you’ll be able to catch the Avatar 3 trailer in full on YouTube from July 28. If you can’t wait that long… I suggest you get yourself down to your local cinema quick sticks.
You might also like- New ransomware proposals set to be implemented by UK Government
- These include a ban on ransom payments for public services
- Ransomware attacks cost the UK economy millions per year
A new set of cyber regulations are being introduced by the UK government in a move to protect British public services from the growing threat of ransomware.
Under the new guidelines, public organisations like the NHS, local councils, and schools will all be banned from paying ransom demands - a move which looks to dissuade criminals from targeting public institutions.
“Ransomware is estimated to cost the UK economy millions of pounds each year, with recent high-profile ransomware attacks highlighting the severe operational, financial, and even life-threatening risks,“ the Government’s statement argues.
Criminal business modelAmongst the high-profile attacks on public services in recent times is a ransomware attack on an NHS hospital, the disruptions from which contributed to a patient death - outlining just how damaging and harmful these attacks can be, not just financially but on a personal level too.
Ransomware-as-a-Service (RaaS) is a multi-million pound industry, and one which preys on vulnerable organisations without premium cybersecurity protections.
Public organisations in the UK with chronic budget restraints are particularly vulnerable, not just because they can’t afford first-rate security, but also because they provide critical services that have devastating impacts if disrupted.
Under the new set of proposals, businesses that are not covered by the ban are required to notify the government if they intend to pay the ransom - giving the government the opportunity to provide them with ‘advice and support, including notifying them if any such payment would risk breaking the law by sending money to sanctioned cyber criminal groups, many of whom are based in Russia.’
“Ransomware is a predatory crime that puts the public at risk, wrecks livelihoods and threatens the services we depend on,“ comments Security Minister Dan Jarvis. “By working in partnership with industry to advance these measures, we are sending a clear signal that the UK is united in the fight against ransomware.”
You might also like- Take a look at our picks for the best antivirus around
- Check out our choice for identity theft protection tools
- Data of all 6.5 million Co-op members stolen - CEO says she is 'incredibly sorry'
- Windows 11 has a new optional update
- It's a big one, delivering a whole load of new features
- These include an AI agent in Settings, a new quick-recovery option for PCs that won't boot, and added AI features for many Windows 11 apps
Windows 11 has a new update in preview, and it's a hefty download which packs in a lot of features, many of which are AI-related (and for Copilot+ PCs only, with their beefy NPUs).
This is patch KB5062660 for Windows 11 24H2, and it should be noted that this is an optional (preview) update, meaning that it's still in testing, so the various features may still have bugs (install it at your own risk, in other words).
Everything should be fully knocked into shape by the time the full update for August arrives, which is when all these features will be officially deployed (or should be – although some are on a 'controlled rollout', meaning they'll be drip-fed out).
So, with those caveats out of the way, what have we got to look forward to with this optional update (and next month's full upgrade)?
Here's my pick of the top features rolling out with KB5062660 (again, bear in mind that some are for Copilot+ laptops only).
1. AI agent in SettingsThe headline functionality here is, sadly for most of us, for Copilot+ PCs only, and it's the addition of the first so-called Windows Agent. This is an AI agent specifically for the Settings app, and it lets you find and manipulate the options you need in a much more convenient way.
Normally, trying to find a setting involves using the search functionality, which can be rather hit-or-miss. With the AI agent, you're essentially getting an intelligent search where you can simply ask a question (in natural language) pertaining to what you're trying to do in Windows 11, and the agent will (hopefully) immediately surface the correct setting.
The AI doesn't just find the right setting for you, but can also make suggestions as to what changes you might want to make as well. Check out the video clip above of the agent in action to get a flavor of how it all works.
This is just rolling out to Arm-based Copilot+ PCs (with Snapdragon CPUs) to start with, but support for AMD and Intel chips is "coming soon" (it's also for the English language only initially).
Suffice it to say this is one of the more impressive uses of AI in Windows 11 I've seen so far, alongside more intelligent Windows 11 search from the desktop (for both Copilot+ laptops, and other PCs too). Yes, Microsoft appears to be progressing overall search capabilities nicely with AI, which is good to see.
(Image credit: Getty Images)2. Click to Do benefitsClick to Do is Microsoft's array of context-sensitive AI-powered options in Windows 11 (for Copilot+ PCs), and a few more shortcuts (for selected text or images) have been added here. That includes a choice to fire up Reading Coach, which is a free app (installed via the Microsoft Store) that aims to help you polish up your reading skills (pronunciation and more besides).
Secondly, Immersive Reader is now in Click to Do, which takes any text and presents it in a "distraction-free environment", allowing you to adjust text size, font, spacing, and a bunch of other parameters to make everything more easily readable. It also helps with reading skills (breaking down words into syllables, providing a picture dictionary, and more).
Draft with Copilot is also now in Word (for Microsoft 365 Copilot subscribers), allowing you to turn a sentence (or short summary) into a lengthy full draft penned by the AI.
(Image credit: xavier gallego morell / Shutterstock)3. Quick recovery from boot failureMicrosoft's Quick Machine Recovery (or QMR) is now arriving for all PCs (not just Copilot+ devices), which is the ability to recover from a problem that means your PC won't boot. This is the nightmare scenario we all dread, and the idea is that you'll be able to get help via the Windows Recovery Environment (which can be accessed if your system won't boot to the desktop).
QMR allows for diagnostic data to be sent to Microsoft and hopefully a patch can be sent back to cure the problem, or that's the idea. Another avenue of troubleshooting – one that's completely automated – is clearly a good idea, and I'm looking forward to seeing how useful this will be. (And I should clarify, I'm keen to see how competent this feature is – not to personally use it, with any luck. We can all hope that it's a screen we don't ever have to visit).
4. Image-related AI powers in Photos, Paint and Snipping ToolA bunch of new AI-powered functionality for images is now inbound (for Copilot+ PCs), as previously seen in testing. That includes a Relight ability in the Photos app – allowing you to place virtual light sources to change the lighting in an image – and object select in the Paint app, which uses AI to select any given object (so you don’t have to do so manually).
A similar feature to the latter is coming to the Snipping Tool called 'perfect screenshot', which lets you roughly select an area of the screen you want to grab, and then automatically makes a precise crop of that element, taking the pain out of that process. (Again, check the above video to see how this works).
(Image credit: Microsoft)Other moves – including an important fixThere's quite a lot going on with this update, as mentioned, and another development is that Recall is now being deployed in Europe. Previously, this AI-supercharged search (that works using regularly taken screen grabs) wasn't out in the European Economic Area (EEA), but it is now, and it comes with a new ability. This is the option to export its screenshots (called snapshots) to "trusted third-party apps and websites" (wherever you want, basically - should you wish to share this data).
Furthermore, all Recall users are getting a reset button, which deletes all data relating to the feature and restores Recall to its original settings, should you wish to start afresh (or indeed abandon the ability and turn it off).
Also, the Black Screen of Death is now official, so wave goodbye to the blue version that's been with us so long, and say hello to a more streamlined effort whenever your PC is unfortunate enough to witness Windows 11 locking up. (I'm not sure about this change, as I've discussed elsewhere at length recently).
The Gamepad layout in the virtual keyboard for Windows 11 now benefits from "enhanced controller navigation" which includes word suggestions and better handling of menus, as well as the ability to use a gamepad to sign in from the Windows lock screen (via the PIN panel).
Finally, this preview update fixes a problem with the May 2025 update for Windows 11 which caused some PCs to suffer instability issues (crashes). Microsoft says this was a "rare" bug that didn't affect many, but it sounds like a truly nasty one, so having it resolved will doubtless be a relief.
You might also like...- Microsoft promises to crack one of the biggest problems with Windows 11: slow performance
- Windows 11's handheld mode spotted in testing, and I'm seriously excited for Microsoft's big bet on small-screen gaming
- No, Windows 11 PCs aren't 'up to 2.3x faster' than Windows 10 devices, as Microsoft suggests – here's why that's an outlandish claim