News
PDFs are everywhere in enterprise workflows – contracts, invoices, policy documents, audit trails. And yet, they’re rarely considered a security risk. That’s a problem.
Across industries, there remains a persistent belief that PDFs are static and inherently safe. This assumption creates a blind spot – one that’s increasingly at odds with how these documents are actually used.
PDFs today are often dynamic, shared across borders, embedded into automated processes, and packed with sensitive information.
Treating them as nothing more than electronic paper is not only outdated – it’s dangerous.
The Myth of the Safe PDFIn many organizations, document workflows haven’t kept pace with broader digital transformation efforts. While teams embrace AI, automation, and cloud services elsewhere, they often rely on legacy document management software that lacks visibility, auditability, and modern security features.
This complacency creates real risk. Sensitive data is moved, stored, and signed without appropriate controls. Metadata is overlooked. Documents are emailed instead of securely shared. And because PDFs don’t “feel” like a security threat, these behaviors often go unchallenged.
What’s more, compliance demands are tightening. Regulations such as GDPR, ISO 27001, and eIDAS 2.0, have raised the stakes, making poor document governance a potential legal liability. Inconsistent handling of digital files – even when unintentional – can result in significant exposure.
The Threat Landscape is Changing – FastIn 2025, cyber threats are evolving faster than ever. Organizations now face average of over 560,000 new malware variants daily, with PDFs increasing being exploited as delivery mechanisms.
Meanwhile, AI-powered attacks have drastically reduced the time it takes for bad actors to move through an organization's systems. Many now breach, escalate, and extract data in under an hour. This accelerated threat landscape makes “invisible” gaps like unsecured PDFs even more dangerous.
Security Must Be Built into the WorkflowThe answer isn’t just to bolt on security – it’s to embed it. Document protection should start at the point of creation and extend across the entire lifecycle. That means using tools and processes that allow for encryption, permissions control, version tracking, secure collaboration, and verifiable digital signatures as standard.
It also means making compliance easy, not optional. Security shouldn’t be something users have to remember – it should be part of how they work. The goal is to integrate protection in a way that supports productivity, rather than hindering it.
There’s a growing role here for AI and automation. From summarizing content and redacting sensitive fields to powering intelligent search and flagging anomalies, modern technologies can help organizations manage documents faster – and more safely.
The Opportunity for Partners and ProvidersThis shift has major implications for the channel. We’re moving into an era where partners are no longer just selling software licenses – they’re becoming workflow consultants and risk advisers. The organizations that stand out will be those that help clients reassess document handling as a core part of their cybersecurity and compliance strategies.
That means understanding sector-specific regulations. It means recommending secure-by-design tools that don’t rely on user vigilance alone. And it means being able to demonstrate how good document practices reduce liability, speed up processes, and build long-term resilience.
For partners who get this right, the rewards are clear - deeper client relationships, stronger value propositions, and a chance to lead in an area that many are still overlooking.
It’s Time to Bring PDFs into the Security ConversationToo many enterprises still treat documents as an afterthought – something to deal with after the “real” cybersecurity work is done. But in reality, documents are where business happens. They’re where data is agreed, signed, stored, and exchanged.
And in today’s environment, where compliance burdens are increasing, AI is supercharging attacks, and breaches can escalate in minutes, PDFs simply can’t be left out of the equation.
If your organization is modernizing its infrastructure, reviewing its compliance position, or assessing security posture, then document workflows need to be part of that conversation.
Because if your PDFs aren’t secure, your business isn’t either.
We list the best cloud document storage.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
- Parallels Desktop 26 launches with support for macOS 26 Tahoe and Windows 11 25H2
- The software introduces Internet Speed Booster, new IT management tools, and updated compliance
- Parallels continues its subscription model without a perpetual license option for customers
Cross-platform working should now be a lot easier folllowing the release of Parallels Desktop 26, the latest version of the popular virtualization software for Mac.
The update introduces compatibility with macOS 26 Tahoe and Windows 11 25H2, as well as a range of tools aimed at individual users and IT teams.
Among its new features is Internet Speed Booster, a mysterious addition with few details available on what it actually does, but its presence may catch the attention of users who run bandwidth-heavy tasks inside virtual machines.
macOS 26 changes“With Parallels Desktop 26, we’re delivering compatibility with Apple’s latest macOS, and powerful new tools for the IT teams and developers who rely on Parallels every day,” said Prashant Ketkar, Chief Technology and Product Officer at Parallels.
“This release reflects our ongoing commitment to Apple innovation and our focus on enabling enterprises and IT admins to securely manage and scale their Mac environments.”
Parallels Desktop 26 improves how Windows virtual machines read Mac disk space.
Microsoft’s OS can now display the storage actually available on the host Mac, reducing potential errors during large software installations or updates.
The software also takes into account how macOS 26 handles background processes, allowing features like Coherence Mode to continue to run without interruption.
The update also adds new centralized management options for enterprise users. Administrators will soon be able to apply policies that control settings such as shared folders, USB access, and clipboard sharing.
The software has renewed its SOC 2 Type II compliance, which supports companies that have to meet strict internal and external security standards.
There’s a new guide for deploying single Windows applications on Macs without requiring users to run a full Windows environment, and integration with Jamf Pro for monitoring and managing Windows updates within virtual machines.
Scripts provided by Parallels will allow IT teams to run scans or start installations remotely.
Parallels Desktop 26 is available in Standard, Pro, Business, and Enterprise editions, but it continues to be offered only as a subscription.
The lack of a perpetual license option will no doubt be a disappointment for many, especially long-term users.
You might also likeMarvel Rivals patch notes arrive every couple of weeks or so, bringing bug fixes, Hero balancing changes, and more general updates. Sometimes, as is the case with the most recent patch, skins are added, and certain Heroes receive buffs or nerfs to better bring them in line with the ongoing meta.
Season 3.5s latest patch notes are now live, and they focus on adding in new skins. There's some new details on Season 3.5's Hero Balancing as well. These constant changes to Marvel Rivals help keep Competitive Mode fresh while providing a steady stream of reasons for players to check back in regularly. Since launch, Marvel Rivals has really proven itself as a worthy contender, landing on our list of the best free games and the best crossplay games.
Here are the latest Marvel Rivals patch notes. These add new skins and an event as part of Season 3.5.
Marvel Rivals next patch notes(Image credit: NetEase)The next Marvel Rivals patch arrives August 28, and adds a new skin for Scarlet Witch, as well as a new event. Here's what's been confirmed so far:
- New skin: Phoenix Chaos (Scarlet Witch)
- New event: Earn 2x Chrono Tokens from Weekly Missions, Challenges, and Season Missions with up to 2000 bonus Chrono Tokens. Available until September 12.
The latest patch for Marvel Rivals launched August 21 UTC. It added the Klyntar: Throne of Knull map and mode.
Marvel Rivals Season 3.5 Hero balancing changes(Image credit: NetEase Games)Below, you'll find a list of the latest balancing changes (August 21) in Marvel Rivals, detailing the buffs and nerfs that've been applied to each character.
- Blade (Buff) - Increase Lifesteal gained during Bloodline Awakening from 60% to 65%. Reduce self-healing reduction from 40% to 35%
- Human Torch (Nerf) - Reduce Flame Field (right-click on terrain) Damage Over Time from 25/s to 20/s; Reduce Pyro-Prison Damage Over Time from 50/s to 40/s
- Loki (Nerf) - Reduce Mystical Missile damage dealt by Loki and his illusions to enemies from 30 to 25. (Healing for teammates remains unchanged.)
As you can see, the latest Marvel Rivals Hero balances apply to Duelists and Strategists, upping their damage, or making their abilities more useful. You can read the full details here.
As a Vanguard player, I'm very interested in the recent Doctor Strange buff. I played him as a main during Season 0, and Season 1. Since then, I've mostly been using Magneto, but the nerfs could mean he's not as viable this season.
You Might Also Like...From smart watches to smart supply chains, digital transformation is reshaping how we live, work and interact. But the true vision of an interconnected world – where billions of everyday items are embedded with intelligence – remains just out of reach.
That’s not because the ambition is too bold. In fact, it’s widely recognized. McKinsey estimates the Internet of Things (IoT) could deliver up to $12.5 trillion in global value by 2030. Extend that connectivity to low-cost everyday objects, and the potential increases dramatically.
So why hasn’t it happened yet?
The biggest roadblock is supply. A truly connected world needs a colossal volume of chips. But we’re not talking about the advanced processors that power smartphones or autonomous vehicles – we’re talking about simpler, highly distributed, low-cost chips that can be embedded into everyday items.
These so-called ‘legacy’ chips – typically manufactured on 28nm or larger nodes – are anything but outdated. They’re critical to modern electronics, supporting high-performance processors and underpinning countless devices across consumer, industrial and automotive markets.
We saw just how vital they are during the COVID-19 pandemic. Shortages of these chips brought global manufacturing to a standstill, delaying everything from cars to home electronics. The ripple effects were felt across entire economies. As the number of smart devices scales, how to prevent a reoccurrence is an ever-present consideration.
So why not just build more chip factories?
Traditional fabs can’t meet future needsScaling legacy chip production is incredibly difficult. The equipment is aging and hard to replace. New fabs cost tens of billions and take years to build. And since mature-node chips don’t deliver the same profit margins as cutting-edge silicon, there’s little financial incentive to invest.
Even worse, legacy fabs are environmentally demanding. They consume vast amounts of energy and water. While next-gen fabs are built for sustainability, retrofitting legacy fabs to reduce their carbon footprint is expensive and complex.
To unlock true scale, we need a fundamentally different approach: one that’s faster, affordable, more flexible – and designed for sustainable, high-volume production.
Enter FlexICsFlexible integrated circuits (FlexICs) are a new class of semiconductor: a chip that’s ultra-thin, physically flexible, and radically more sustainable.
Instead of traditional silicon wafers and high-temperature processing, FlexICs use thin-film technology and a low-energy manufacturing process. Think: less water, less energy, fewer harmful chemicals – and much faster turnaround.
This breakthrough unlocks a faster, more agile development cycle. Designs go from tape-out to volume production in weeks, not months. Costs are dramatically reduced. And it becomes viable to prototype, iterate and customize chips without the high stakes typically associated with silicon design.
Built for ubiquitous intelligenceThis isn’t just a manufacturing story. It’s a transformation in how and where intelligence can be deployed.
FlexICs enable connectivity in places where traditional chips simply can’t go. Their ultra-thin, flexible form factor means they can be embedded directly into products or packaging, even on curved surfaces, delivering smarter, more connected experiences almost anywhere.
And they support standard communication protocols such as NFC, unlocking seamless, item-level intelligence for mass-market products – and the fastest digital connection between brands and their customers.
This embedded intelligence has multiple roles to play, from driving loyalty programs and exclusive content based on location or season, to product authentication, provenance information – or even facilitating improved reuse and recycling for a more circular economy.
It also offers a practical route for embedding real-time data collection into previously passive environments, whether that’s logistics chains, recycling systems, or agricultural operations.
Wherever you need intelligence, FlexICs bring it – sustainably, affordably, and at scale.
The future is flexibleBut its goal isn’t about competing with silicon fabs. It’s about complementing them – addressing the unmet need for scalable, cost-effective, environmentally conscious production of the chips that will power the next wave of smart, connected systems.
We’re standing at the threshold of a hyperconnected future. But realizing that future depends on embedding intelligence at unprecedented scale. Flexible chips are the key to unlock that potential and make the vision of an interconnected world a reality.
We list the best performance management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
- Tbps-scale DDoS attacks have shifted from rare anomalies to constant threats
- Hacktivist groups weaponize automation and botnets to destabilize fragile infrastructure
- Political disputes increasingly spill online, triggering destructive waves of cyber aggression
The first half of 2025 marked another MAJOR escalation in distributed denial-of-service (DDoS) activity, with new NetScout research documenting more than eight million attacks worldwide in these six months.
More than three million attacks were recorded across Europe, the Middle East, and Africa, underscoring the regional strain.
It also noted terabit-per-second scale strikes, once rare anomalies, have become almost routine, with peaks reaching 3.12Tbps in the Netherlands and 1.5Gbps in the United States.
Political conflict drives digital aggressionThese findings suggest DDoS attacks are no longer an occasional disruption, but an entrenched method of destabilizing essential networks, as geopolitical tensions remain a key trigger for major attack campaigns.
NetScout noted how disputes between India and Pakistan spurred extensive waves of hostile activity against Indian financial and governmental systems.
Similarly, during confrontations involving Iran and Israel, over 15,000 strikes targeted Iranian infrastructure in a matter of days, while fewer than 300 targeted Israel.
Even international forums were not spared, with events in Switzerland experiencing more than 1,400 incidents in a single week.
Much of this scale also relies on compromised devices operating as botnets.
In March 2025 alone, attackers launched an average of 880 botnet-driven incidents daily, with peaks of 1,600.
The compromised systems typically included routers, servers, and IoT devices, often relying on known flaws rather than undiscovered vulnerabilities.
Despite years of security warnings, these weaknesses remain consistently exploited, enabling short but impactful campaigns that disrupt dependent services.
For organizations relying only on basic antivirus or endpoint protection, such sustained botnet traffic presents challenges that overwhelm conventional safeguards.
Furthermore, the evolution of DDoS campaigns has been accelerated by automation and artificial intelligence.
Multi-vector strikes and carpet-bombing techniques now occur faster than defenders can respond, creating asymmetric pressure.
NetScout also pointed to the emergence of “rogue LLMs,” which provide hostile actors with accessible planning and evasion methods.
Combined with DDoS-for-hire platforms, these tools have significantly reduced the barriers for inexperienced attackers, enabling high-capacity strikes with minimal technical depth.
The outcome is that Tbps-scale incidents have shifted from rare spectacles to constant risks.
Among hacktivist collectives, NoName057(16) continues to execute the most frequent campaigns, far outpacing rivals.
In March, the group claimed more than 475 attacks, primarily directed at government portals in Spain, Taiwan, and Ukraine.
Their reliance on varied flooding techniques indicates both coordination and persistence, suggesting ideological motivations beyond opportunistic disruption.
While new players such as DieNet and Keymous+ entered the scene with dozens of attacks across multiple sectors, their activity still fell short compared with NoName057(16)’s scale.
“As hacktivist groups leverage more automation, shared infrastructure, and evolving tactics, organizations must recognize that traditional defenses are no longer sufficient,” stated Richard Hummel, director, threat intelligence, NetScout.
“The integration of AI assistants and the use of large language models (LLMs), such as WormGPT and FraudGPT, escalates that concern. And, while the recent takedown of NoName057(16) was successful in temporarily reducing the group’s DDoS botnet activities, preventing a future return to the top DDoS hacktivist threat is not guaranteed.”
You might also like- The best antivirus software can keep your devices protected
- Surf the web at speed with the best browser
- AI in the workplace: the legal risks businesses can’t afford to ignore
- Adobe reveals addition of Gemini 2.5 Flash Image to Firefly and Express
- Firefly models are already supported by models from Google, OpenAI and more
- Gemini 2.5 Flash Image promises better performance
Google’s Gemini 2.5 Flash Image is now available in Adobe Firefly for text-to-image functionality and Adobe Express.
Gemini 2.5 Flash Image allows Adobe users to generate stylized graphics in Firefly, then animate, resize, add captions and publish via Adobe Express, making the whole end-to-end process even slicker.
Other use cases include campaign asset changes for marketers (such as swapping backgrounds and creating variations), and prototyping product concepts for designers.
Adobe Firefly and Express get Gemini 2.5 Flash ImageAlthough many of these features were previously available using Adobe’s own Firefly models, Google’s Gemini model improves the experience with better context and knowledge, consistency and performance.
Adobe also uses other partner models from companies like OpenAI, Black Forest Labs, Runway, Pika, Ideogram, Lume AI, Moonvalley and more to give users the choice. By not restricting them to in-house models and giving them more flexibility, it ultimately means customers are more likely to stay subscribed to Adobe’s platform.
For a limited time, Adobe is offering paid customers unlimited generations with Gemini 2.5 Flash Image as a welcome promotion. Even free Firefly users will be able to access up to 20 generations to test the newly added model.
Regardless of model selection, though, Adobe stressed that user-generated content and uploads will not be used to train generative AI models.
“This has always been the case for Adobe Firefly generative AI models, and it’s a requirement in all our partnership agreements,” VP of New GenAI Business Ventures Hannah Elsakr wrote in a blog post.
“With today’s addition of Google’s Gemini 2.5 Flash Image in Adobe Firefly and Adobe Express, people have even greater flexibility to explore their ideas with industry-leading generative AI models and create stunning content with ease,” Elsakr added.
You might also like- These are the best AI image generators
- Want a change? We’ve listed the best Adobe Photoshop alternatives
- Adobe Firefly is about to make its biggest leap in AI video yet with a new model and Veo 3 integration
- The Samsung Galaxy S26 Ultra could have a camera island
- This is apparently necessary due to upgrades to the main and telephoto cameras
- However its battery capacity might not be increased
The Samsung Galaxy S26 Ultra will be a mixed bag of big upgrades and completely unchanged specs, if the latest leaks are anything to go by, but let’s start with the rumored upgrades.
According to South Korean site Newsis (via SamMobile), the Galaxy S26 Ultra will have a camera island. That’s a camera design we haven’t seen on this line of phones since the Samsung Galaxy S21 Ultra, with subsequent models having lenses that protrude directly out of the back instead.
According to this report, the move to a camera island on the Galaxy S26 Ultra is a necessary change to accommodate upgrades to the phone's main and telephoto cameras.
The source doesn't specify what these upgrades are, mind, but we’ve previously heard multiple times that the Galaxy S26 Ultra’s main camera might have a wider aperture, allowing it to capture more light. The Galaxy S26 Ultra’s telephoto camera might also have a wider aperture, so those could be the upgrades referred to here.
Today’s report also doesn’t detail what shape the camera island will be, so it’s unclear whether this will be a return to the design of the Samsung Galaxy S21 Ultra or something different. But either way, it should make the phone look very different from the Samsung Galaxy S25 Ultra from the back.
No battery boostThe Samsung Galaxy S25 Ultra (Image credit: Future / Lance Ulanoff)Now for the less good news – SamMobile has spotted a Chinese certification for a new Samsung battery that the site believes is intended for the Galaxy S26 Ultra, and it has a 5,000mAh capacity, just like the battery in the Galaxy S25 Ultra.
While that isn’t small, it is a lower capacity than many rival handsets, and it’s a capacity that Samsung seems very reluctant to go beyond.
Still, even if this battery does end up in the Galaxy S26 Ultra, the phone might have better battery life anyway thanks to a more efficient chipset, and reports have also suggested it might offer faster 65W charging.
We’re not expecting to see the Samsung Galaxy S26 Ultra until January, though, so there’s plenty of time for other leaks to emerge and contradict these ones.
You might also like- The Samsung Galaxy S26 Ultra could have a privacy-boosting AI trick built into its screen – here’s how it works
- Two key specs leak for the Galaxy S26 – and we may get a battery upgrade at last
- The Galaxy S26 Edge could be even thinner with a bigger battery, which sounds too good to be true – but I hope it is
- Salesloft was breached when OAuth tokens from SalesDrift were stolen
- Google tracked the threat actors as UNC6395
- ShinyHunters claimed responsibility for the attack
Revenue workflow platform Salesloft suffered a cyberattack which saw threat actors break in through a third-party and steal sensitive information.
The company is using Drift, a conversational marketing and sales platform that uses live chat, chatbots, and AI, to engage visitors in real time, alongside its own SalesDrift, a third-party platform which links Drift’s AI chat functionality to Salesforce, syncing conversations, leads, and cases, into the CRM via the Salesloft ecosystem.
Starting around August 8, and lasting for about ten days, adversaries managed to steal OAuth and refresh tokens from SalesDrift, pivoting to customer environments, and successfully exfiltrating sensitive data.
Attack attribution"Initial findings have shown that the actor's primary objective was to steal credentials, specifically focusing on sensitive information like AWS access keys, passwords, and Snowflake-related access tokens," Salesloft said in an advisory.
"We have determined that this incident did not impact customers who do not use our Drift-Salesforce integration. Based on our ongoing investigation, we do not see evidence of ongoing malicious activity related to this incident."
In its write-up, Google’s Threat Intelligence Group (GTIG) said the attack was conducted by a threat actor known as UNC6395.
“After the data was exfiltrated, the actor searched through the data to look for secrets that could be potentially used to compromise victim environments,” the researchers said.
“GTIG observed UNC6395 targeting sensitive credentials such as Amazon Web Services (AWS) access keys (AKIA), passwords, and Snowflake-related access tokens. UNC6395 demonstrated operational security awareness by deleting query jobs, however logs were not impacted and organizations should still review relevant logs for evidence of data exposure.”
Google seems to believe this is a unique threat actor, which is why it gave it a unique moniker UNC6395.
However, hackers known as ShinyHunters told BleepingComputer the attack was actually their doing - although Google begs to differ, telling the site, "We've not seen any compelling evidence connecting them at this time."
You might also like- A flaw in Google OAuth system is exposing millions of users via abandoned accounts
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers
Spoilers for The Summer I Turned Pretty season 3 episode 8 ahead.
Can you hear the sound of Prime Video fans sighing with relief? The Summer I Turned Pretty season 3 episode 8 has finally stopped the wedding that should never be happening, though Belly (Lola Tung) currently isn't in a position to see that as a good thing. Since the very first season of the hit show, she's been torn between brothers Conrad (Christopher Briney) and Jeremiah (Gavin Casalegno), yet chooses to marry Jeremiah after a haphazard proposal at the end of season 3 episode 1.
However, as we saw from the bachelorette party in season 7, it's all a bit more complicated than that. Conrad and Belly both still have feelings for each other, with Belly refusing to acknowledge how she really feels while Conrad makes a brave declaration of his love. After finding out Jeremiah has cheated on her (twice), Conrad begs Belly to leave him and be with her, prompting Belly to respond that they "never meant anything." Ouch.
Obviously, we know this is a complete lie, as Belly dances around the club picturing Conrad as the future she wants. She's been making bad decision after bad decision as she's intent on marrying someone who doesn't even respect her, pushing everybody else away in the process. But something beautiful happens in The Summer I Turned Pretty season 3 episode 8, and it involves absolutely no boys at all (almost).
Belly finally chooses herself in The Summer I Turned Pretty season 3 episode 8Lola Tung (Belly) in The Summer I Turned Pretty. (Image credit: Amazon Prime Video)Jeremiah seemingly got the boot in episode 6, but season 3 episode 8 has officially broken off their engagement on the morning of the wedding. In the penultimate scene, Jeremiah claims that he's been waiting for Belly to admit she still has feelings for Conrad, saying that he's known through the entire engagement that the pair have a bond that goes beyond the superficial romance Belly and Jeremiah have. He sees the way Belly looks at Conrad, stating (rightly, for once) that Belly can't marry Jeremiah simply to bury the feelings she has for Conrad.
As we hear from Belly's voiceover, she can't bring herself to go through with the wedding either, breaking off their hand-holding as Jeremiah leaves the room. However, her screen time tells us a different story, practically begging Jeremiah to marry her while claiming what they have is special, and Conrad is nothing in comparison. Absolutely nobody is buying this, though, and I for one could have punched the screen I was so overjoyed.
We've been waiting for Belly to have her head screwed on and properly start thinking about what's best for her, rather than just chasing who happens to have her heart at the moment. By catching a flight to Paris (where else?), she's giving herself the time and space she needs to think things through, recuperate while hopefully finding herself in the process. No boys means no drama, and The Summer I Turned Pretty should reflect that as the healthiest choice... but it won't.
How do I know this? Because as Belly arrives at the airport terminal, she spots Conrad sitting across from her, clearly waiting to go somewhere too. The screen cuts to black before we see Belly's full reaction to him sitting there, but either The Summer I Turned Pretty season 3 is heading straight back to its old tricks, or Belly's seeing someone that isn't actually there. I've no doubt we'll be seeing more where the peach stand scene came from, but let me have my man-free victory in peace for more than just a week, Amazon.
You might also like- Stand ready for Invincible season 5's arrival, worm: Amazon confirms the hit Prime Video show's fourth chapter won't be its last
- Ballard season 2 would have a ‘very exciting’ arc says Maggie Q – but the Bosch spin-off might not return, despite being Prime Video’s #1 show
- New to Prime Video? Here are 5 movies and TV shows with over 90% on Rotten Tomatoes to get you started
- Project Moohan could launch on September 29, according to a new leak
- It will be Samsung's first Android XR headset
- Pricing may be cheaper than the Apple Vision Pro
We've been waiting a long time for Project Moohan, Samsung's first XR (extended reality) headset developed in partnership with Google. It was announced back in December, but thanks to a new leak we may now have a release date and a price for the device.
According to Newsworks (via GSMArena), Samsung is plotting another Unpacked event for Monday, September 29, to announce the Android XR headset. Sales will then follow on October 13, beginning in Samsung's home country of South Korea.
Samsung has already said the headset will be launching in the second half of 2025, so the new information fits with that. Project Moohan is just a codename though ("moohan" means "infinity" in Korean), so we're still not sure exactly what it's going to be called.
The report mentions pricing too: between 2.5 and 4 million won. Samsung won't use a direct currency conversion internationally, but for reference that's a starting price of $1,790 / £1,330 / AU$2,765 at today's rates.
Choose your realityWe've already given the headset a try (Image credit: Jacob Krol/Future)This is Samsung's first XR headset: the XR term encompasses both augmented reality (digital elements on top of the real world), virtual reality (completely enclosed digital worlds), and mixed reality (digital elements interacting with the real world).
In other words, XR = AR + VR + MR, so this sounds like a true all-rounder. The Meta Quest 3 is marketed as a mixed reality headset, and based on the time we've spent with Project Moohan prototypes, this new device will work in a similar way.
Apple completely ignores these terms for the Vision Pro, which it calls a "spatial computer", but it's the same sort of thing really. In our testing, we found Project Moohan to be a less premium, more lightweight take on the Apple Vision Pro approach.
We'll be able to try out the finished version of the product in the near future. It looks as though there'll be a Snapdragon XR2+ Gen 2 processor fitted inside, together with 16GB of RAM, and Gemini AI will of course be available on board.
You might also likeA Fortnite Megazord skin is set to launch next month, adding in the iconic Power Rangers battle robot, as well as additional items to earn. This all ties in with the ongoing Power Rangers collaboration as part of Chapter 6 Season 4 (Shock 'N Awesome).
What's new in Fortnite?(Image credit: Epic Games)Fortnite just launched a One Punch Man collaboration. This adds a new mythic which powers up your Harvesting Tool. You'll be able to take enemies down with one hit of the pickaxe. There's additional One Punch Man skins to take a look at in the store too, as well as new items on the Island Map.
Now that a brand new season of Fortnite has launched. There's a completely fresh map to try out, and the addition of a bug-fighting ranking system. There are ranks to rise through in each match, giving you access to progressively more powerful gear.
We've got a while until the next season of Fortnite arrives, but there's plenty to keep us busy until then. It's regular updates like these that continue to keep Fortnite ranked highly in our best free games list.
Here's everything you need to know about the Fortnite Dino Megazord skin, including when it's coming to the game and details on how to unlock it once it's here. As new info is revealed closer to launch, we'll be sure to update this page.
Fortnite Megazord release date(Image credit: Epic Games)Fortnite's Megazord skin will release on September 16, 2025. This can be seen in the in-game calendar that's on the main menu screen before loading into a match. Battle Pass owners will be able to complete Quests to unlock the Dino Megazord skin and associated cosmetics. The Megazord Quests will be available to progress until November 1, 2025.
The best place to keep up on specific updates closer to the launch of the new season is the Fortnite Status Twitter account. We'll be sure to keep this page up to date as well.
How to unlock the Fortnite Megazord skin(Image credit: Epic Games)You'll be able to start completing Quests on September 16, 2025 that progress towards the Fortnite Dino Megazord skin. As with previous special skins like Superman, earning XP will slowly unlock more and more rewards. We'll have to wait until closer to launch to know exactly what these quests are, but expect them to revolve around Power Rangers items, weapons and NPCs.
You Might Also Like...While many boardrooms buzz with excitement about AI, cloud migration, and digital transformation, the reality on the ground tells us a different story. The gap between strategic vision and technical execution is widening, creating what we call the "last mile problem”, where promising technologies fail when they meet the messy reality of legacy systems, data governance, and real-world constraints.
Digital transformation isn’t just a matter of buying the right tools, the right computer, and getting rid of legacy tech. But anyone who has actually tried to implement these technologies on a scale knows the reality is messy and complicated.
As businesses scramble to capitalize on AI, green software, cloud, there is a growing disconnect between technical reality, and grand strategic vision. We call it the ‘Devil’s in the Detail’ approach: a philosophy that embraces the often uncomfortable, technical realities of deploying innovation, where real, lasting transformation occurs.
Many initiatives fail in the ‘last mile’ - we’ve seen this from self-driving cars to retailers implementing new payment systems. Often, the grand vision survives until it meets the messy reality of legacy systems, data governance, and cross-border compliance.
Understanding what sounds good in a boardroom presentation versus what works in real lifeWhat sets builders apart from talkers isn’t always just the technical expertise - it's understanding that implementation is strategy. Consider the challenge of AI bias mitigation, a priority that generates significant attention across every industry, from automotive giants to the NHS and schools across the UK.
The technical reality is often more complex than typical policy discussions suggest. Everyone agrees AI bias is bad, but practically speaking, it’s extremely difficult to get your hands on digitized data in certain languages or from underrepresented groups to actually train the bias out of an LLM model - what you put in, you get out. Even if you could, there are often substantial compliance issues when it comes to moving sensitive data across borders.
More fundamentally, addressing AI bias requires understanding the full data lifecycle, from collection and preprocessing through model training and deployment. Each stage introduces potential bias amplification that technical teams must identify and mitigate. This requires expertise that spans machine learning, data engineering, regulatory compliance, and domain-specific knowledge about the business processes being automated.
This represents the operational reality that technology consultancies must navigate. Bridging the gap between strategic intent and technical execution. The approach requires organisations to maintain rigorous standards while managing client expectations around feasibility and timelines. A practical step may also be an ‘AI/Data Officer’ in the room when discussing plans for tech strategy. It’s something we use to make sure that the goals being shared will match technical execution.
Making new tech ready for prime timeHow can organizations make new tech ready for prime time? It’s about making sure the approach works in the real world, not just in word documents. This approach is particularly crucial in retail, where the gap between digital transformation promises and delivery reality can make or break customer experiences. A checkout system that works beautifully in testing but crashes under Black Friday traffic volumes isn't just a technical failure; it's a business catastrophe.
The organizations that thrive in digital transformation recognize that implementation complexity is not a barrier to overcome but a competitive advantage to master. The technical depth required to navigate these challenges becomes a differentiating capability in markets where strategic vision alone is insufficient.
As media narratives elevate hype over practicality, the businesses that succeed will be those who can decode the messy middle, not just theorise from the top. The devil, as they say, is in the detail, and that's exactly where real transformation happens.
Technical expertise becomes a strategic asset when organizations understand that successful digital transformation requires mastery of implementation complexity rather than just conceptual innovation. Companies that invest in deep technical capabilities, understanding distributed systems, data governance, and integration patterns, create sustainable competitive advantages that can't be easily replicated through strategic planning alone.
Decoding the messy middleThe broader lesson here is that enterprise technology transformation isn't just about adopting new tools or the shiniest new product. It's about understanding how those tools actually work in complex, real-world environments. As media narratives elevate hype over practicality, the businesses that succeed will be those who can decode the messy middle, not just theorize from the top.
Lots of people have lofty points of view on AI, cloud, and responsible tech. But these technologies are usually much more complicated when you lift up the hood. Untangling this complexity is hard and important. It's a reminder that in an industry obsessed with the next big thing, sometimes the most valuable skill is knowing how to make the current big thing work. The devil, as they say, is in the detail. And that's exactly where real transformation happens.
We've featured the best IT infrastructure management service.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Financial services firms are no strangers to cyberattacks, often facing some of the most expensive consequences. In 2024, the average cost of a data breach in the financial industry worldwide was $6.08 million, while the global average cost of a data breach across all studied industries was $4.88 million.
The growth of Ransomware-as-a-Service (RaaS) has amplified this threat. Today’s attackers often operate within organized networks that leverage AI-driven technologies for target selection, breach execution, and extortion. This is a particular challenge for financial services, already a key target by cybercriminals thanks to the sector’s lucrative assets and sensitive data.
To counteract this rising tide, the EU introduced the Digital Operational Resilience Act (DORA) earlier this year - a sweeping regulation that mandates enhanced risk management, incident reporting, and third-party oversight in the financial sector. For financial institutions, compliance with DORA is more than a tick-box exercise, it’s a strategic imperative for operational survival.
A structured path to resilienceDORA’s framework provides financial institutions with a structured path to resilience by requiring institutions to develop comprehensive strategies for identifying, reporting, and mitigating information and communications technology (ICT)-related incidents. In the context of ransomware, the regulation emphasizes the importance of early detection, accurate reporting, and verified data integrity.
When a ransomware attack occurs, the initial response window, often within the first hour, is critical. Swift, coordinated actions can mean the difference between a controlled incident and a full-scale operational crisis. As a result, DORA compels financial organizations to establish and regularly test detailed response plans, ensuring staff are trained and roles are clearly defined.
One of the cornerstones of compliance is the ICT risk management audit, which involves identifying all types, locations, and classifications of data and storage infrastructure. To do this effectively, organizations must adopt tools that provide full visibility into their data environments, as this allows for rapid and accurate reporting when incidents occur. These tools can link isolated datasets and apply uniform security policies across hybrid and multi-cloud environments, saving a business large amounts in downtime damages.
Ensuring data visibility and controlcybercriminals increasingly targeting critical data sites, IT teams are now required to continuously monitor for infrastructure anomalies. This is particularly important in cell-level data corruption, a stealthy form of attack where malicious code is embedded deep within databases, lying dormant until it’s triggered to corrupt vital assets. These attacks are difficult to detect and can undermine trust in the integrity of the entire dataset.
The key effective countermeasure is to maintain secure, immutable backups that are regularly tested for integrity and can be restored rapidly if needed.
AI plays a vital role here. Modern AI tools can detect anomalies in user behavior, flag potential compromises, and automate the process of isolating malware-infected backups. By continuously scanning for subtle changes in data patterns, these systems serve as an early warning mechanism, triggering immediate recovery and minimizing disruption.
To be effective, backup systems must also be resilient themselves. This means ensuring that storage locations are physically secure, regularly tested, and not connected to the network in a way that would allow them to be compromised during an attack. Immutable storage is increasingly seen as a best practice, as it ensures data cannot be altered once written.
Speed matters: responding to an active threatOnce a ransomware attack is detected, a fast response is required . IT teams must act swiftly to isolate affected systems and end-users, minimizing the potential spread of malware. Data management tools enable teams to quickly identify which datasets have been accessed or altered, allowing for precise damage assessment and targeted recovery.
If backups have been properly maintained, organizations can restore data without paying a ransom. However, in order to avoid fines for non-compliance and to assist regulatory investigations, institutions must also be able to accurately report the specifics of the attack, including the strain of ransomware involved and its impact on operations.
Building a culture of preparednessTrue cyber resilience doesn’t begin in the moment of attack, it starts with preparation. DORA mandates that financial services providers not only implement technical defenses but also cultivate a culture of readiness and transparency. This includes having a clearly communicated, continually updated ransomware response strategy that extends to third-party service providers.
Failure to comply with DORA can result in substantial penalties, including fines of up to 2% of global annual turnover. Beyond avoiding financial harm, compliance also offers a strategic advantage; it demonstrates to customers and partners that an institution can be trusted to safeguard sensitive data and maintain operational continuity in the face of threats.
The future of data protectionAs ransomware threats continue to evolve, financial institutions must shift from reactive defense to proactive resilience. Regulatory frameworks like DORA offer not only a roadmap for compliance but an opportunity to strengthen operational integrity and customer trust. By investing in visibility, rapid response capabilities, and a culture of preparedness, organizations can not only meet regulatory expectations—but emerge stronger, more secure, and more competitive in an increasingly high-risk digital environment.
We've featured the best online cybersecurity course.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro