News
- Genki has unveiled its new handheld gaming accessory collection, available exclusively online starting today (May 29)
- The collection is designed to eliminate the common frustrations while playing on the go
- All-new accessories include a Modular Grip Case, Minimalist Protective Case, a 30W Wireless Power Bank, and more
Genki, the innovative gaming accessories company, has unveiled its brand new handheld accessory lineup.
The collection, which Genki is calling "its most complete accessory lineup yet," is officially available exclusively at its online store starting today (May 29) and arrives just in time for the newest generation of handheld gaming consoles, like the Nintendo Switch 2.
The lineup includes a range of different accessories, including the Attack Vector Modular Grip Case, Force Field 2 Minimalist Protective Case, Sleeper Ultra Protective Zipper Carry Case, and Aegis Shield Perfect Screen Protector.
There's also the 30W MagSafe Wireless Power Bank, Detachable Controller Charging Station and Grips, Mimic Chest Game Cartridge Storage Case, and the Saya Carry bag.
These all-new accessories are purpose-built for uninterrupted handheld gaming and designed to eliminate the common frustrations while playing on the go by introducing ergonomic upgrades, smart power solutions, and rugged protection, "all engineered with Genki’s signature focus on innovation and design."
"The problem with handheld consoles has always been the trade-off between portability and a complete gaming experience—whether it’s poor ergonomics, limited battery life, or inadequate protection. Genki, known for redefining portable play, is tackling these challenges head-on," Genki said.
You can check out the Genki handheld accessory collection pricing details below and see the collection here.
- Attack Vector Modular Grip Case - $49.99 / $59.99 with travel cover
- Force Field 2 Minimalist Protective Case - $29.99 / $39.99 with travel cover
- Sleeper Ultra Protective Zipper Carry Case - $42.99
- Aegis Shield Perfect Screen Protector - $19.99
- 30W MagSafe Wireless Power Bank - $69.99
- Detachable Controller Charging Station and Grips - $39.99
- Mimic Chest Game Cartridge Storage Case - $19.99
- Saya Carry Case - $139.99
- Qualcomm has addressed three zero-days abused since January 2025
- The patches must now be applied by OEMs
- No details about in-the-wild abuse, but users should still be on guard
Qualcomm has finally patched three Adreno GPU zero-day vulnerabilities that were being abused in the wild.
According to the June 2025 Android Security Bulletin, the chipmaker has now fixed CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038.
The first two are incorrect authorization flaws in the Graphics component. They were given a severity score of 8.6/10 (high), and could trigger memory corruption. They were first observed in January 2025. The third bug is a use-after-free vulnerability in the Graphics component that also leads to memory corruption. This one was given a lower severity score - 7.5/10.
Payment information intact"There are indications from Google Threat Analysis Group that CVE-2025-21479, CVE-2025-21480, CVE-2025-27038 may be under limited, targeted exploitation," Qualcomm explained.
"Patches for the issues affecting the Adreno Graphics Processing Unit (GPU) driver have been made available to OEMs in May together with a strong recommendation to deploy the update on affected devices as soon as possible."
Now, it’s up to different device manufacturers, such as Samsung, Google OnePlus, or Xiaomi, to apply these patches in their products.
The affected devices span a wide range of Qualcomm chipsets, including flagship models like the Snapdragon 8 Gen 2 and Gen 3, as well as midrange and budget platforms such as the Snapdragon 695, 778G, and 4 Gen 1/2.
There are currently no details on who abused these flaws, against whom, and to what end, however similar vulnerabilities were seen used in the past in spyware campaigns such as Variston and Cy4Gate.
A separate Qualcomm bug (CVE-2024-43047) was used by Serbian secret service agency, BIA, in December 2024, to unlock Android devices seized from journalists, activists, and protestors, the same source claims.
Via The Hacker News
You might also like- Qualcomm releases raft of security patches, urges users to fix now
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers
- The 3i G10+ has a big onboard dust bin with dust compression
- It's designed to hold up to two months' worth of dirt in one go
- This removes the need for a bulky self-empty dock
If your home is on the smaller side but you still want a robot vacuum, typically you need to make a choice: opt for a bulky dock with a big dust cup that the robovac can automatically empty into, or take a compact, charge-only dock and commit to manually emptying the bot's small onboard bin on a regular basis.
3i has come up with a third option. Its newly announced G10+ robot vacuum has built-in dust compression, and aims to be the best robot vacuum for those with small homes.
Inside, you'll find a mechanical paddle that physically squishes the contents of the onboard dustbin as the bot goes about its cleaning, to maximise how much dirt it can carry. The onboard bin itself is also large at 950ml – bigger than that found on most cordless vacuums.
(Image credit: 3i)All that means that even though there's nowhere for the robot to dump its dirt in the dock, it still shouldn't need emptying too often. In fact, 3i suggests it can hold up to eight weeks' worth of dust and debris… although that will vary by how much there is in your home that needs sucking up. (Pet owners should expect to have to empty it more regularly, for instance.) If you're worried about debris being stored for so long, 3i has added a built-in UV light to sterilize the bin's contents.
There are further benefits to this setup. The dust squishing happens in real time as the robot cleans, and it's silent. You'll never have to listen to the (sometimes noisy) sound of your robot vacuum auto-emptying every time it parks up. And there are no dock dust bags to dispose of, or to remember to buy.
3i isn't quite the first robovac brand to explore the idea of dust compression, but it does look like the best current option for those with limited space. The Narwal Freo X Plus has onboard compression, but that model still comes with a bulky dock; one that has water tanks but no dust bag. Another option to consider is the iRobot Roomba 205 DustCompactor Combo offers dust compression and a charge-only dock, although given the company's recent troubles, now might not be the best time to invest in a new Roomba.
(Image credit: 3i)Elsewhere, the 3i G10+ features an extendable side brush and mop for effective edge cleaning (the latter via a mop pad with an unusual protrusion), and a very-decent 18,000 Pa of suction. There's automatic carpet detection and intelligent suction and water flow adjustment based on the type of dirt the bot encounters, and the same LiDAR navigation system and AI-powered obstacle avoidance as 3i’s flagship model (the S10 Ultra).
It's also relatively affordable – the list price is $499, but it's launching with a discount that takes it down to $399 (usually an indicator that it won't generally be sold at list price). One of the things that often bumps up the price of today's flagship robot vacuums is a fancy dock that offers things like mop pad cleaning; if you don't necessarily want those things but are still keen on an advanced robot vacuum, this could potentially be a great solution.
The 3i G10+ robot vacuum goes on sale at Amazon US on 29 May. We're in the process of testing it, and will have a review live for you to read as soon as possible.
You might also like...- CD Projekt Red has shared a new tech demo for The Witcher 4 at the State of Unreal 2025 showcase
- The demo revealed new cinematic and gameplay footage, which offered a first look at the region of Kovir and protagonist Ciri
- The gameplay footage captured is running on the base PS5 at 60 FPS with ray tracing
Updated June 3, 2025
CD Projekt Red has clarified in a statement to VGC that the footage shown today was a tech demo set in The Witcher 4 world, and wasn't The Witcher 4 gameplay, suggesting that what we saw won't be connected to the narrative.
"This is a tech demo, and a first look at the cutting-edge technology powering The Witcher 4 – but not The Witcher 4 itself," a spokesperson said.
"It showcases the powerful foundation we’re building in close collaboration with Epic Games to push open-world design further than ever before and the core systems and features we’re developing using Unreal Engine 5.
"We’re really proud of this early milestone and excited to give you a sneak peek at some of the cool tech like UAF, Nanite Foliage, Smart Objects, ML Deformer and FastGeo Streaming that are helping shape the future of The Witcher."
Original Story:
CD Projekt Red has shared a brand new look at The Witcher 4 with an impressive tech demo.
During the State of Unreal 2025 event today, we were treated to a technical demo that offered an early glimpse into the Unreal Engine 5.6 features that will be in The Witcher 4.
At the start of the livestream, we saw a short cinematic of a group of men being attacked by a monster, before the footage seamlessly transitions into gameplay. We then see Ciri, the game's titular Witcher and playable protagonist, emerging from a cave onto a cliff after investigating the attack and showing off the never-before-seen region of Kovir.
According to CD Projekt Red, the gameplay shown is running on the base PS5 at 60 FPS, with ray tracing enabled, and it looks incredible.
Just like Geralt of Rivia, Ciri also has her own horse companion named Kelpie, and the two of them can be seen riding through the mountains and dense forests of Kovir to the port town of Valdrest.
The town is bustling with crowds of NPCs, some of whom will react to certain instances created by the player, thanks to Unreal Engine's MetaHuman technology with Mass AI crowd scaling.
For instance, when Ciri knocks into a man carrying apples, she kicks off a chain reaction. She apologizes, and then a child can be seen running forward to steal some apples that fell on the ground, followed by a pig looking to eat them up.
We also see other NPCs interacting with each other and creating their reactive scenes, making the whole town feel alive. It also appears that gameplay will seamlessly transition back into cutscenes when Ciri reaches her destination and starts a conversation, suggesting there'll be no black loading screens in between these moments.
Tools like the new Unreal Animation Framework and Nanite Foliage rendering are being utilized in The Witcher 4 to help deliver an immersive world at 60 FPS without compromising on quality, according to the developer.
"We started our partnership with Epic Games to push open-world game technology forward," said CDPR co-CEO Michał Nowakowski. "To show this early look at the work we’ve been doing using Unreal Engine running at 60 FPS on PlayStation 5, is a significant milestone - and a testament of the great cooperation between our teams.
"But we're far from finished. I look forward to seeing more advancements and inspiring technology from this partnership as development of The Witcher 4 on Unreal Engine 5 continues."
The studio also confirmed that while the tech demo was running on a PlayStation console, "the features and technology will be supported across all platforms the game will launch on", including Xbox and PC.
You might also like...Ever since Prime Video revealing they were doing a Carrie TV adaptation, I've been eagerly following along. The recent casting announcement has only made me more excited, too, as Scream and Five Nights at Freddy's star Matthew Lillard is stepping into the shoes of the horror story's well-meaning principal, aka Mister Morton.
I'm so excited to see Lillard's take on a character who's taken many forms over the years from the original Stephen King novel and the 1976 movie classic, to the not-so-good 2013 retelling. It'll be interesting to see if they stick to the novel or make changes his character, too.
I already had high hopes for this project, which has Netflix horror aficionado Mike Flanagan at the helm. He's well-known for his successful horror series such as The Haunting of Hill House and Midnight Mass, so I'm expecting his Amazon TV take on another of King's most iconic works to be another small screen hit.
Who else is going to appear in Amazon's Carrie TV adaptation?Sissy Spacek as Carrie White in Carrie (1976) (Image credit: United Artists)Alongside Lillard, there are numerous famous faces attached to appear.
For starters, Cult of Chucky's Summer Howell stepping into the shoes of the titular telekinetic teenager. Joining her is Samantha Sloyan, who recently starred in The Pitt, aka one of the best Max shows, as Carrie's domineering and god-fearing mother Margaret White.
Other names include Alison Thornton as Chris Hargensen, i.e. the popular schoolgirl and Carrie's major bully, Amber Midthunder as gym teacher Miss Desjardin, and Thalia Dudek, Josie Totah, Arthur Conti, and Joel Oulette in supporting roles.
We still don't know a lot about this project yet, but it's likely we'll spend a lot more time getting to know these characters as Flanagan can do a lot more with a TV remake than, say, a film's two-hour runtime. Here's hoping it's a horrifying hoot that'll earn a spot on our best Prime Video shows list in due course.
You might also likeHello and welcome to our coverage of InfoSecurity Europe 2025!
Held at London's Excel center, Infosec 2025 (as everyone actually calls it) is one of the biggest security-focused events on the calendar, packed with big names, informative talks, and news from the biggest firms around.
We're here in London and live on the ground for Infosec 2025 - here's what we've seen so far!
Good morning from InfoSecurity Europe 2025! We're here at the Excel, and off to collect our badge before heading in.
Despite it being June, it's a cloudy and blustery day here - let's hope things are warmer inside...
(Image credit: Future / Ellen Jennings-Trace)We're heading in to the show now!
As you can see from our pictures, the theme of Infosec 2025 is "Building a Safer Cyber World" - something you can bet we'll hear more about over the next few days.
(Image credit: Future / Ellen Jennings-Trace)(Image credit: Future)We're now seated for a super packed keynote, plenty of people are standing - so this is clearly a popular one! We're about to hear from Graham Cluley, host of the Smashing Security Podcast who'll introduce us all to Infosec's 30th year!
There's a quick look back to how far cybersecurity has come in the last 30 years before Cluley explains that hackers aren't girlfriend-less men in garages anymore (his words!), but are serious, state sponsored actors - outlining an almost unrecognisable evolution in that InfoSec has helped to guide security experts through.
(Image credit: Future)Now, we're listening to Professor Brian Cox who's talking us through the link between cosmology and cybersecurity and computing. General relativity, the theory of space and time, and cosmology all link closely to quantum computing - with complex mathematics, data sets, and quantum mechanics.
(Image credit: Future)Next, it's 'Quantum computing v Cybersecurity' - chaired by BBC News' Joe Tidy. Here, cybersecurity is described as an 'Arms Race' - although not everyone think that terminology is helpful!
There's a myth, panel expert and Lastwall CEO Karl Holmqvist explains, that quantum computers can break any encryption. But really, at the moment, quantum computers can decrypt several commonly used encryptions - encryption will look different in the age of quantum, but it could still be effective. Cryptography will remain an important facet of cybersecurity for a long, long time - he argues.
"Harvest now, decrypt later" is a huge talking point. The industries most at risk (unsurprisingly) are the 'critical national' warns Daniel Cuthbert - panel participant and cybersecurity expert. That means healthcare, finance, and telecoms could face serious difficulties in a PQC (post-quantum cryptography) world.
(Image credit: Future)Next up - we're listening to Paul Chichester and his take on the 'Cyber Cold War' and the geopolitics of cyber threats. Paul is the Director of Operations at the NCSC - so investigating cyber threats is his bread and butter.
As everyone knows, geopolitics is key to the cyber landscape. Cyber operations are now one of the go-to tools for covert state campaigns. Conflicts today are powered by cyber capabilities. Chichester points to the Viasat offensive in the Russian war in Ukraine as a prime example, and he explains that targeted attacks are increasingly disruptive, especially in the case of Russia, which are focusing on the logistical supply chain of materials into Ukraine.
Good cybersecurity has helped Ukraine, namely in the recent drone attack, which seemingly took Russia entirely by surprise. This shows the importance of great cybersecurity, Chichester argues. Defence, when done right, can be a vital weapon.
Beyond state sponsored attacks and espionage, states are using cyber capabilities for sabotage and coercion. Real world sabotage used cyber as a tool to inform operations. Volt Typhoon, Chichester points out, is a perfect example of how geopolitics threatens critical infrastructure. States are understanding that penetrating critical infrastructure will likely form the basis of conflict in the future.
So what's the takeaway? Well, it's that geopolitics should inform your cyber strategies as security team - so make sure to integrate this conversation into your risk management and global footprint landscapes.
Now, a little break from the keynote stage and on to exhibition floor for some showcases and introductions!
(Image credit: Future)First, we're headed to Okta, who are talking us through their AI-driven identity threat protection. Okta are keen to tell us about the shared risk signals, which allow a security event provider to transmit risk signals to Okta, enabling customers to use these to uncover potential identity threats in their ecosystem. "Years ago, attackers used to hack systems, now they log in", Okta warns.
Rubrik is next up, showcasing its data resilience and data security solutions for cyber recovery. Rubrik talks me through the devastating effects of ransomware on companies, particularly recently for retail organisations, and the importance of cyber recovery. A robust cyber recovery plan can mean a firm goes from a thirty day recovery, to just a 48 hour bounce back, Rubrik explains.
(Image credit: Future)Here we're listening to ‘calling BS on AI’, a panel about how agentic and generative AI are affecting the threat landscape.
Most people think that AI is powering organisations in a novel way, but that’s not quite true - says Zeki Turedi, CrowdStrike's Europe Field CTO. AI is just facilitating threat actors in their attacks, but it’s not revolutionising the way attacks are leveraged. Attackers are more efficient and quick thanks to AI - but it uses existing capabilities.
One of the biggest factors for AI is the damage in trust. Deepfakes, for example, are eroding trust all round and are a disruptive force - but generative AI’s.
Dr Andrea Isoni introduces a pretty shocking statistic - 30-40% of web traffic is malicious bot traffic, meaning the treat of data theft is ever present for organisations with these trawlers looking to exfiltrate as much as possible.
The main question is how fast this will change. Generative AI is in its infancy, and the trend of more sophisticated deepfakes, like the impersonation attack we saw on Susie Wiles, are only likely to get more potent in future. Organisational processes and training will be a huge factor for CISOs going forward.
(Image credit: Future)Next up, we're visiting Cloudflare, which claims to bring "everywhere security" to its customers. Specifically, this refers to the company's unified cybersecurity platform that protects users from "Network to Cloud, Apps to AI". Cloudlflare recently introduced a set of E2E PQC protections which helps organisations with safeguarding network traffic - PQC continues to be at the forefront of conversations so far at Infosec 2025!
(Image credit: Future)Finally for today, we’ve taken a quick stop at DarkTrace, where they’re giving a mini-talk and overview about the difference between reactive and proactive network security. Staying ahead of attacks and understanding your cloud security posture is crucial, DarkTrace argues - and the right role permissions and access controls are key to protecting from insider threats.