News
- A banner showing off all four Pixel 10 models has been spotted on the Google Play Store
- You can see the Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, and Pixel 10 Pro Fold from the back
- Other leaks have revealed possible dimensions and colors
The Google Pixel 10 series is now just weeks away, but there might not be much left for Google to unveil at this rate, as the company has seemingly accidentally shared a render showing all four expected models.
Android Authority has found a banner in the Google Play Store app showing the Pixel 10 itself, the Pixel 10 Pro, the Pixel 10 Pro XL, and the Pixel 10 Pro Fold. Google presumably didn’t mean for this banner to appear yet, as the accompanying text says ‘Now available’ – but perhaps the company won’t mind so much given that it has already intentionally shown off the Pixel 10 Pro.
In any case, three of the phones are shown here in a gray-blue shade believed to be dubbed Moonstone, while the base Pixel 10 is pictured in a much brighter blue that’s reportedly called Indigo.
A render of all four Pixel 10 models, leaked by Google itself (Image credit: Google / Android Authority)Sadly, the phones are only shown from the back, and thanks to previous leaks, there’s not really anything here that we haven’t seen before. But we can now say with certainty that this is what the Pixel 10 series will look like.
In other news, Android Headlines has claimed that the Pixel 10 Pro Fold will be sold in just two shades – the Moonstone option pictured above, and Jade, which is more of a pale green.
Previous leaks suggested the other Pixel models will be sold in four shades, so you might not have as much choice here, but at least Moonstone and Jade are a bit more interesting than what Google could have gone with.
Getting thicker and heavierAnd finally, Android Headlines has also shared what it claims are the dimensions for the entire Google Pixel 10 series. Supposedly the Pixel 10 and Pixel 10 Pro will both be 152.8 x 72 x 8.6mm, making them the same height and width as their predecessors, but 0.1mm thicker.
The Google Pixel 10 Pro XL is said to be 162.8 x 76.6 x 8.5mm, making it identically sized to the Google Pixel 9 Pro XL, but apparently it will be heavier at 232g, compared to the 221g of its predecessor.
And the Pixel 10 Pro Fold is apparently 155.2 x 150.4 x 5.2mm when unfolded and 155.2 x 76.3 x 10.8mm when folded, making it marginally narrower but thicker than the Pixel 9 Pro Fold when folded, and marginally wider and thicker when unfolded. It’s also apparently 1g heavier at 258g.
So, if these leaked dimensions are accurate, then unlike many smartphone makers, Google won’t be making any attempts to slim its phones down.
Google is holding an event on August 20 where we expect all of these devices to be unveiled, so we’ll find out exactly what they’re like then – or perhaps sooner if Google accidentally reveals more details in the meantime.
You might also likeThe recent ransomware attack on Peter Green Chilled, a UK logistics provider responsible for refrigerated deliveries to major supermarkets, didn’t just delay shipments. It sent a warning shot to the entire retail industry. When chilled goods can’t reach stores, the consequences are immediate: shelves go empty, supply chains falter and customer trust erodes. This attack joins a string of recent incidents targeting retailers including Marks & Spencer, Co-op, Harrods, Adidas and Victoria’s Secret.
What’s happening isn’t random. Retail is being deliberately and strategically targeted by cybercriminal groups aiming to create high-impact disruption. These organizations are particularly vulnerable because they rely on just-in-time logistics, operate on thin margins and depend on a vast network of third-party vendors and suppliers. When one link in that chain breaks, the effects cascade, making retailers more likely to pay ransoms to get back online fast.
Scattered Spider and the Evolution of Social EngineeringAmong the groups behind this wave of attacks is Scattered Spider, also known by its designation UNC3944, a highly sophisticated collective that has focused its efforts on enterprises in both the UK and the U.S.
Scattered Spider rose to notoriety through phishing and SIM-swapping campaigns, but it has since evolved into a much more formidable threat. Today, the group employs a blend of social engineering, credential harvesting and abuse of legitimate tools to infiltrate environments and evade detection.
Key to Scattered Spider’s effectiveness is its ability to impersonate internal support teams. By using tactics like help desk impersonation and SMS-based phishing, also known as smishing, they exploit trust relationships within an organization. Employees, particularly those in IT and administrative roles, become the primary targets. When these workers are convinced to reset MFA settings or hand over credentials, the attackers gain immediate, privileged access.
What sets Scattered Spider apart is its fluency in English, familiarity with Western business operations and ability to operate in real time. These are not language-barrier-limited, spray-and-pray operations. These are targeted intrusions executed with precision.
When Trusted Tools Become Threat VectorsPerhaps most concerning is how attackers are co-opting the very tools defenders rely on. Remote administration utilities like AnyDesk, TeamViewer and Microsoft Quick Assist are frequently used by internal IT teams for legitimate support tasks. But in the hands of an adversary, they become stealthy weapons.
These tools don’t raise red flags in the same way malware might. They’re signed, trusted and often already whitelisted in security policies. That makes them perfect vehicles for attackers seeking to maintain persistence and move laterally inside networks.
Retail organizations, with dispersed physical locations and complex logistics ecosystems, are particularly reliant on remote access software. This reliance opens up a massive surface for abuse, especially when access permissions are overly broad or insufficiently monitored.
A Playbook for Retail ResilienceAs threat actors increasingly exploit trusted tools and personnel, retailers must focus on reducing their attack surface and limiting the blast radius of potential breaches. This means going beyond reactive measures and embedding proactive security into everyday operations. Retailers can take action with strategies like these:
Harden Identity Controls: Organizations must implement strict policies for MFA and password resets. Real-time monitoring of these actions is essential to catch anomalies such as MFA enrollment from an unfamiliar device or rapid changes to high-privilege accounts.
Lock Down Remote Access: Remote access tools should be treated as sensitive assets. Their use must be tightly controlled, with policies in place to ensure they are only enabled when explicitly approved. Security teams should maintain inventories of authorized tools and actively hunt for unauthorized use.
Monitor for Behavioral Anomalies: Relying solely on signatures and known indicators of compromise is no longer sufficient. Security operations centers (SOCs) should implement behavioral analytics to identify unusual access patterns, like logins during off-hours, large data transfers from point-of-sale systems or unusual access from vendor accounts.
Prioritize Training for High-Risk Roles: Help desk workers, IT administrators and third-party vendors often have elevated access and are prime targets for social engineering. These employees must receive ongoing training not just on phishing, but on impersonation tactics, smishing attempts and unusual requests that should raise red flags.
Protecting Trust, Operations and the Bottom LineThe recent surge in retail-targeted ransomware attacks underscores a critical truth: security is no longer just a back-office function. It’s a frontline defense that directly affects customer experience, brand reputation and business continuity.
Retailers can no longer afford to take a reactive stance. The focus must shift toward continuous control validation, proactive threat hunting and investing in tools that reduce human error and shorten response times. That means combining technical controls with a strong culture of awareness, empowering employees to be an extension of the security team, not just a vulnerability.
The next ransomware attack won’t just compromise data. It could halt the movement of goods, empty shelves and leave customers questioning a brand’s reliability. For retailers, cybersecurity is now a matter of operational survival. And for groups like Scattered Spider, the attack surface has never been more inviting.
We list the best identity management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Dandadan season 2 made its triumphant return to Netflix at the beginning of July, and has since released three episodes under its belt. So far we’ve seen Jiji become possessed, a giant death worm threatening to trap people and Momo outright escaping death. Episode 3 ended with a volcanic eruption impending on the resort town and we’ll be able to see what happens next in episode 4, which is set to air later this week (July 25).
Instead of the hit Netflix anime tapering off after its explosive season 1, it’s a case of so far, so much better when it comes to Dandadan season 2. The action sequences are more dynamic, the tension has been raised even higher through fatal stakes, and there’s enough lore and backstory to never fully know whether you’re coming or going. We could put this down to the incredible storytelling and craft we knew we should expect from season 1, but is that all?
As it turns out, no. The more I watch Dandadan season 2, the more it feels like there’s been a change that I can’t put my finger on. To my surprise, I’m actually onto something, with the show’s creators confirming as much – about the change that’s been right in front of us the entire time – at Anime Expo 2025.
Dandadan season 2’s creators have purposefully changed colours to make scenes more excitingAccording to series director Fuga Yamashiro, the change in Dandadan season 2 is down to a change in the show’s color palette to highlight key moments when the team were originally running out of colors to use. “At first, I thought I could continue with Dandadan's signature use of shifting color palettes,” he explained (via ScreenRant). “However, I quickly ran into a problem as audiences tend to interpret colours very literally. For example, what I see as a subtle difference between pink and red might look identical to someone watching the anime at home. I began running out of colors to differentiate characters and scenes thematically.”
He continued: “So rather than just playing with color, I introduced different visual textures to Dandadan. This season, you’ll notice some cuts have rougher finishes resembling oil paintings for instance rather than watercolor. This shift gives scenes a totally different impression because of its texture rather than its hue. This was my big experiment this season.”
As far as I’m concerned, it’s a big experiment that’s paid off. It’s hard to tear your eyes away from the screen as it is, but the extra lift in the show’s most dynamic moments make it nigh on impossible. If anything, it’s strange there was a sense of uncertainty from the creative team when on screen, Dandadan feels more certain of its own greatness than ever.
We’ve still got eight episodes of season 2 left to go, and absolutely anything can play out over that space of time. There are some things we can take a logical guess will happen in all their newly found bright glory (such as the Evil Eye continuing to haunt Jiji), but the original manga arcs can only tell us so much. Our best guess is that season 2 will close out with the Space Globalists Arc, while a Kaiju continues to threaten the search for the second golden sphere in the meantime. Whatever happens, more screen time for Turbo Granny, please.
- Battlefield 6 will be officially revealed in a special livestream today
- The broadcast begins at 4pm BST / 5pm CEST / 11pm EST / 8am PST
- A cinematic trailer or the first look at gameplay is likely to be showcased
Electronic Arts has officially announced Battlefield 6, and a first look at the next game will be revealed today in a special livestream.
The 'Battlefield 6 Official Reveal Trailer' broadcast is scheduled to take place today, July 24, at 4pm BST / 5pm CEST / 11pm EST / 8am PST and can be watched on the official Battlefield YouTube channel.
A teaser was shared earlier this week showing four soldiers overlooking what appears to be a war-torn New York City, with the Brooklyn Bridge caught in an explosion.
EA hasn't confirmed the details of the upcoming livestream or how long it will last, but we're expecting a cinematic trailer at least or a potential gameplay overview showcasing the setting, roles, and first-person shooter action.
Closed beta tests for Battlefield 6 have been running for the past few months, so this will be the first time the game has been shown off to the public.
Before the livestream announcement, it was reported that content creators familiar with the series had been receiving special packages from EA.
It was also claimed by Battlefield content creator Rivalxfactor that there will be a three-day EA event following the game's official reveal; however, the creator stated this would occur on July 29, which we now know to be false and is happening today instead.
You might also like...- France Travail breach could affects thousands
- No threat actors assumed responsibility, and the data has not yet been abused
- This is not the first time France Travail has been hit
France’s national employment agency has suffered a cyberattack in which threat actors allegedly accessed sensitive data on “hundreds of thousands” of people.
In a data breach notification letter, sent to affected individuals and seen by French local media, France Travail said the criminals accessed the data through Kairos, a digital platform mostly used by training organizations and employment counselors to manage professional training activities, including tracking course enrollment, validating funding requests, and monitoring job seeker progress.
Initial reports place the number of affected individuals at roughly 340,000, with the exposed data including full names, postal addresses, email addresses, phone numbers, and France Travail ID numbers.
Suspects arrestedWhile there is no evidence of abuse in the wild, this type of data is valuable for criminals looking to carry out identity theft or other activities.
Knowing the identities and contact information of people who were looking for work, threat actors can create convincing emails, inviting people to fake job interviews. Through these interviews, they can deploy all sorts of malware, or even ransomware.
Lazarus Group, for example, is famous for its Operation DreamJob campaign, in which it invites their targets to fake job interviews.
The good news is that financial information, such as banking data or credit card information, was not leaked. Still, France Travail urged all users to remain vigilant, and pay special attention to unsolicited emails.
According to Cybernews, this is not the first time France Travail suffered a cyberattack, as a March 2024 incident was significantly larger in scope, affecting 43 million individuals - more than two-thirds of the country’s entire population, making it the largest cyberattack in French history.
In the aftermath, three suspects aged 21 to 23 were arrested in connection to the attack. All three were based in France and allegedly impersonated Cap Emploi advisors to gain access. No known ransomware group has claimed responsibility, and the attack has not been formally attributed to any organized cybercriminal group.
You might also like- Dior fashion brand hit by cyberattack and customer data leaked - here's what we know
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers
- Report finds over half of UK companies could be missing out on revenue from slow AI adoption
- 30% are worried they've missed the AI adoption window
- UK businesses are among the most AI-optimistic
Over half of UK companies could be losing up to 5% of monthly revenue simply down to a delay in AI adoption – a considerable loss that could be easily fixed.
Research by Couchbase found four in five (79%) agree AI tools give them a competitive advantage, but many are failing to move quickly enough, with as many as one in three (30%) now fearing they've missed the AI adoption window.
"The AI race has clearly already begun and while the potential is clear, complexity and fragmentation leave many businesses struggling to keep up," Couchbase Global Customer Technology Strategy Leader Chris Bridgland explained.
UK businesses are missing out on the AI raceMore than half (51%) of the businesses surveyed said they're worried about project failure, which is holding them back from adopting AI.
Others battle with data access and management (44%), creating safe environments for AI experimentation (40%) and security issues associated with third-party AI solutions (43%).
Although AI readiness is at its highest with generative AI, this still only stands at 56%. Alarmingly, only 40% feel ready for AI-powered applications, and even fewer (32%) feel prepared for agentic AI, which promises huge automation benefits.
Despite the challenges, the UK still leads the way when it comes to optimism, with 50% believing it will enhance customer experience compared with 35% in India and 32% in Germany. Half (52%) also believe agentic AI will help them to identify new trends.
Looking ahead, two-thirds (68%) agree that AI would be easier to control when there are fewer technologies involved. "As AI architectures grow more sophisticated, organisations are realising that simplicity isn’t a compromise, it’s a competitive advantage," Bridgland added.
You might also like- OpenAI says it has proof its tools are making workers more productive
- We've listed the best AI writers around
- Check out the best productivity apps on offer today
- T-Mobile’s Starlink-powered satellite service has just fully launched
- You can connect to satellites without needing apps or settings changes
- It’s available for a monthly fee, even to non-T-Mobile customers
T-Mobile has just launched its Starlink satellite service, dubbed T-Satellite, after testing it for many months. It brings connectivity to remote areas not currently served by any of the major mobile networks – but what do you get from T-Mobile, and how does it compare to the free alternative offered by Apple?
With T-Satellite, T-Mobile says you’ll get coverage provided by over 650 satellites orbiting the Earth. Your phone will connect automatically, with no apps to download or settings to change. That said, you may get a small amount of downtime as your phone disconnects from one satellite and connects to another – the satellites are moving in orbit, after all, so you won’t always be hooked up to the same one.
According to T-Mobile, the service works with over 60 mobile devices. That includes every iPhone from the iPhone 13 onwards, the Samsung Galaxy S21 and later, Google Pixel phones going back to the Google Pixel 9, and more.
Other supported devices include the latest Motorola Razr 2025 series and the latest Samsung Galaxy A56. You can read the full list on T-Mobile's eligibility guide. The latest Samsung Galaxy Z Flip 7 FE and Samsung Galaxy Z Fold 7 are listed as "coming soon".
If you’re on T-Mobile’s Go5G Next or Experience Beyond plans, you get T-Satellite included for free. Other T-Mobile customers can access it for $10 a month per line, although the company says the price will rise to $15 per month after a “limited time.” Customers of other networks can also sign up for $10 a month (later $15 a month) by contacting T-Mobile.
How does Apple compare?(Image credit: Apple)Apple has offered its own satellite service for a few years now, so you might be wondering what its advantages and disadvantages are compared to T-Satellite.
For one thing, Apple’s offering is a lot broader than what you get with T-Mobile. With Apple, you can send and receive messages, contact emergency services, share your whereabouts with Find My, organize roadside assistance for your vehicle, and get weather reports. T-Satellite, meanwhile, only supports sending and receiving text messages. It doesn’t offer data or any of the other services that Apple supports.
As well as that, Apple’s satellite functionality is entirely free (for the time being, at least), whereas T-Mobile’s requires a monthly subscription. On the other hand, you can only access Apple’s satellite service if you have an Apple device, while T-Mobile’s works with a range of iOS and Android products.
You’ll need to consider which option suits you best based on your circumstances. But with T-Satellite emerging from its beta-testing period, you’ve got another choice for staying connected when you’re off the grid.
You might also like- Broadcom was given European approval to acquire VMware in July 2023
- CISPE's European Cloud Competition Observatory has issued Broadcom two red warnings
- CISPE is now asking the European Commission to annul its decision amid ongoing concerns
The Cloud Infrastructure Service Providers in Europe (CISPE) has filed a formal appeal to challenge the European Commission's decision to approve Broadcom's 2023 acquisition of VMware.
CISPE – a group representing Europe's sovereign cloud infrastructure providers, and recently in the news for bringing complaints about Microsoft's unfair cloud licensing fees – is now seeking annulment of the Commission's decision.
The news comes around two years after the European Commission approved the takeover, at which point Broadcom promised to deliver continued interoperability.
CISPE isn't happy about Broadcom's VMware acquisitionIn November 2024, CISPE announced it would be launching the European Cloud Competition Observatory (ECCO) to monitor competition. Later in February 2025, the organization wrote: "In the case of Broadcom, CISPE members and customers report little or no engagement from the company on their issues."
As such, ECCO assigned a Red/Critical status to Broadcom, which was reconfirmed in May 2025 when ECCO wrote: "This second report finds that Broadcom’s wide ranging and brutal imposition of unfair contract terms for cloud infrastructure service provides continue unabated."
At that time, ECCO called for "urgent official investigations," while CISPE Secretary General Francisco Mingorance noted that "Broadcom shows no interest in finding solutions, or even of working with European cloud infrastructure providers."
"Urgent action is needed," Mingorance added.
On July 24, 2025, CISPE claimed there had been errors in law and a flawed competitive assessment by the Commission in the first place – although the Commission had acknowledged competitive risks, it had not imposted conditions on Broadcom.
Since the VMware takeover, Broadcom has terminated contracts with short notice periods and introduced new licensing terms with drastic price hikes (up to 10X) and mandatory multi-year commitments.
In this most recent development, Mingorance noted that hospitals, universities and municipal authorities have also been affected – not just cloud service providers.
"The Commission was warned this would happen, yet it stood by. It must now reconsider its decision," the Secretary General concluded.
TechRadar Pro has asked Broadcom for a response to CISPE's complaint, but we did not receive an immediate response.
You might also like- We've listed the best cloud hosting providers
- Check out our roundup of the best virtual machine software
- VMware reveals major channel partner shake-up - and it's bad news for smaller firms