News
After the mother of all hattricks, Ted Lasso season 4 is officially underway, according to a new teaser from Apple TV+. In the clip (see below), Jason Sudeikis (Ted Lasso), Hannah Waddingham (Rebecca Welton), Juno Temple (Keeley Jones) and Jeremy Swift (Leslie Higgins) are reunited, with a scene filmed in Sudeikis’ hometown of Kansas City, suggesting a huge location change from Richmond will be featured in the next installment. However, the scene is cut off before things can really get going, so what’s actually happening is anybody’s guess.
Also up in the air is the eventual season 4 release date, alongside whether other core cast members will be returning. Phil Dunster (Jamie Tartt), Nick Mohammed (Nathan 'Nate' Shelley), Sarah Niles (Dr Sharon M Fieldstone), Anthony Head (Rupert Mannion), Toheeb Jimoh (Samuel 'Sam' Obisanya), Cristo Fernández ( Dani Rojas), Kola Bokinni (Isaac McAdoo), Billy Harris ( Colin Hughes) and James Lance (Trent Crimm) are yet to be confirmed for a Ted Lasso return, and we likely won’t be finding out if they are until much closer to the hit Apple TV+ show’s eventual release (or at least with enough time passed that a full season 4 trailer can be released).
You might have noticed one name missing from the above list, and that’s for good reason. Even though they don’t appear in the Ted Lasso season 4 production teaser, we know they’ve been promoted to series regular… and been swiftly recast in the process.
The main gang is back together in Apple TV+’s Ted Lasso season 4 teaser, but the same can’t be said for HenryI’m talking about Henry, who is Ted Lasso’s son in previous seasons. He was originally played by Gus Turner, but instead of Turner returning for the role, Obi-Wan’s Grant Feely has taken over. Back in March 2025, sources claimed (via The Independent) that the show was looking to recast Henry in order to use an actor who was “proficient in soccer,” meaning we’re likely to see Henry on the pitch even more in upcoming episodes. Deadline has also confirmed Henry is now a series regular as of season 4, appearing more infrequently across seasons 1-3.
Of course, this isn’t the only on-pitch change we’ll expect to see in season 4. Ted will now be coaching AFC Richmond women’s football team, with stars like Tanya Reynolds (Sex Education), Jude Mack (Back in Action), Faye Marsay (Adolescence), Rex Hayes, Aisling Sharkey (Jurassic World: Dominion) and Abbie Hern (My Lady Jane) tipped to take on the role of new players. Currently, all we know is that these new faces are definitely onboard in some capacity.
If you watched Ted Lasso season 3, you’ll remember we left off with everything pretty wrapped up, and it felt as though all of our key players were skipping off to the horizon with their happy endings. Ted didn’t give up on coaching, entirely, instead coaching Henry's soccer team after moving back to Kansas City. AFC Richmond beat their rival while placing second overall in the league, with Rebecca revealing she is selling the club. Apple TV+ has so far confirmed the following plot for season 4: “Ted returns to Richmond, taking on his biggest challenge yet: coaching a second division women’s football team. Throughout the course of the season, Ted and the team learn to leap before they look, taking chances they never thought they would.”
How this actually happens after that finite season 3 ending remains a mystery, but if it means Lasso and the gang are reunited in Richmond, then get me back pitchside.
You might also like- The Studio season 2: everything we know so far about the popular Apple TV+ show's return
- I wrote off Your Friends & Neighbors due to its 78% Rotten Tomatoes score, but this underrated Jon Hamm-led dark comedy is more proof Apple TV+ is in a league of its own
- Platonic season 2's trailer looks even more unhinged than the Apple TV+ show's ridiculous first season – and that’s the best news we could ask for
- The latest Pokémon Presents has offered new details about Pokémon Legends: Z-A and other upcoming Pokémon games
- Pokémon Friends has been announced and is now available for Nintendo Switch, Switch 2, iOS, and Android devices
- Pokémon Champions has been confirmed for a 2026 release
The Pokémon Company has unveiled a deluge of new information about several of its upcoming games, while also announcing a new title, Pokémon Friends.
Revealed during the July 22 Pokémon Presents, Pokémon Friends is now available on Nintendo Switch, Nintendo Switch 2, iOS, and Android devices.
It's a puzzle-solving game featuring a series of randomly generated brainteasers that can be completed daily to earn Pokémon plushies, which can then be used to decorate your in-game rooms.
"Unwind with puzzles in Pokémon Friends! Solve sets of three randomly selected puzzles to help untangle your mind – then place the yarn you obtain into the Plush-O-Matic, a special machine that creates in-game Pokémon plush!" the game description reads.
"As you try to make them all, you can track your crafted plush in the catalogue. You can also mark your calendar with a stamp each day you play."
The game features over 1,200 puzzles that were each inspired by the world of Pokémon. Trainers can also complete friend quests, track daily progress with stamps in their calendar, and collect up to 150 different plushies.
Pokémon Friends is free on mobile, but the game is priced at $15.99 on Nintendo Switch and Switch 2. There's also a $53.99 version called the Pokémon Friends Combo Bundle that bundles together the base game and two Puzzle On! packs.
Alongside the new game announcement, new details were also shared about Pokémon Champions, which is now confirmed to be arriving in 2026 for Nintendo Switch, Nintendo Switch 2, iOS, and Android devices.
In this game, players can recruit Pokémon to their team and battle other Trainers in three game modes: Casual Battles, Ranked Battles with players around the world, and Private Battles that can be played with family and friends.
A core feature of Champions is Trial Recruitment, which allows players to try out Pokémon and test strategies for a limited time.
There's also a Permanent Recruitment that lets players keep Pokémon by using Victory Points (VP), which are gained through various methods such as Ranked Battles. Players can also use VP to train Pokémon according to their own preferences, including altering their stats and Abilities.
(Image credit: The Pokémon Company)Finally, we also learned fresh details about the next major mainline Pokémon game ahead of its official release later this year, Pokémon Legends: Z-A.
In an extended gameplay trailer, developer Game Freak offered an in-depth look at the game's explorable setting, Lumiose City. During the day, players can explore and find Pokémon to capture in wild zones, where they may encounter stronger, more powerful wild Pokémon dubbed alpha Pokémon.
Meanwhile, at night, players can compete in the Z-A Royale and climb the ranks by battling other Trainers, including Corbeau, the boss of Rust Syndicate, an organisation operating in Lumiose City.
New NPCs were also introduced, including Emma, a detective who asks the player to track down missing Pokémon, items, and take part in battles, and Mable, the acting director of Pokémon Research Lab, who is researching the habits and reasons behind the growing population of Pokémon.
When players arrive in Lumiose City, they'll be asked by Urbain or Taunie to join Team MZ, a crew dedicated to keeping Lumiose City a peaceful place. They can then go on to explore the city, change and customize their appearance and outfits, and earn rewards by completing tasks.
(Image credit: The Pokemon Company)Mega Evolutions is another thing the latest trailer explored. Although we have previously been teased for this new system, Game Freak offered a new look at Mega Dragonite, a newly discovered Mega-Evolved Pokémon.
It will be up to the player and Team MZ to investigate Mega Evolutions, battle, and calm a variety of Rogue Mega-Evolved Pokémon, and in exchange, obtain Mega Stones as rewards.
Pokémon Legends: Z-A launches on October 16, 2025, for Nintendo Switch and Nintendo Switch 2.
UK pre-orders and US pre-orders are now live, along with the newly announced Switch 2 bundles.
You might also like...New HBO Max series The Yogurt Shop Murders arrives on the streaming service on August 3, 2025 to tell the harrowing story of a murder case in Austin, Texas, from 1991. Back then four teenage girls were shot at a shop called I Can't Believe It's Yogurt in the city, and despite it being more than 30 years on, the crimes are still unsolved (though two men did serve time for the crimes).
Interviews with family members and friends of the victims, lead police investigators, lawyers, experts and press will be aired over the new documentary’s four episodes, which will drop separately on a weekly basis on the platform throughout August. It’s the first time we’ll have seen the true crime case explored publicly in this much depth. Indeed, it marks a moment in time Austin residents still say they “can’t believe.”
For me, it’s an absolutely devastating watch even before having seen a single episode, from the victims themselves to the questions that still plague a community three decades later. However, I know it’s going to be a vital piece of television, which means it very possibly is on track to be the best crime series of the year.
New HBO Max series The Yogurt Shop Murders reopens the unsolved case over 30 years onWhen you’re somebody who likes to binge true crime series pretty regularly (much like me), you can often get caught up in the fanfare of it all. When one episode ends, a tantilising cliffhanger is engineered for you to carry on watching the next, and nine times out of ten, it’s successful editing. This means you can often forget the human element in what you’re seeing, which can even lead to documentaries being created for the wrong reasons. All of this, however, is something The Yogurt Shop Murders immediately avoids.
The deaths of 13-year-old Amy Ayers, 17-year-old Eliza Thomas, 17-year-old Jennifer Harbison, and Jennifer's 15-year-old sister Sarah are obviously still such a shock to the residents of Austin – you’d have a heart of stone not to be overwhelmed by the rawness of their grief. At the time of the incident, Jennifer and Eliza were merely trying to get through a shift at work, with the younger two girls waiting for a lift home in the front of the shop after it closed. An hour before, a man was permitted to use the toilet in the back of the shop, with it alleged the rear door was jammed open in the process.
When first responders arrived at the site around an hour after closing, they found all four victims each with a gunshot wound to the head. The fact that there was so much organization and control in the process suggested to officials that the suspect was an adult, with Robert Springsteen, Michael Scott, Maurice Pierce, and Forrest Welborn all later suspected of being involved. Scott and Springsteen were released from prison in 2009 after their convictions, with Springsteen’s conviction originally overturned in 2006.
All of this is set to be covered in much more detail in The Yogurt Shop Murders, but no matter where you look in the overall story, there’s such an enormous sense of sorrow and bereavement. For many viewers, the new HBO Max show is going to be the first time they’ve extensively heard from the families and friends affected, or perhaps even heard of the case at all.
In its core, this is exactly what true crime shows should be created for – giving a voice to those who no longer have it while bringing a wider sense of awareness. It’s strange to say, but I’m looking forward to finding out more about the people remembered rather than the crime, even if I’ll be moved to tears in the process.
You might also like- Netflix’s Amy Bradley Is Missing captivates with its strange clues to the missing woman’s whereabouts – but if you want a happy ending, you’re better off with these 3 TV shows
- Netflix’s wild new crime documentary is ‘like a spinoff of Narcos’ – here’s what people are saying
- I was nervous about Netflix’s OceanGate documentary but here’s why I recommend everyone should watch it
- Launched on July 27, 2025, a new VPN service seeks to fix issues with providers' trust
- VP.net uses Intel SGX hardware to supposedly deliver "cryptographically verifiable privacy"
- Researchers uncovered some vulnerabilities with Intel SGX systems in the past
A new VPN service has just landed in the market, promising to take a completely different technical approach to users' privacy.
Short for Verified Privacy, VP.net claims to be built in a way that physically separates users' identities from their browsing activity at the hardware level. By doing so, the provider seeks to fix issues linked to virtual private network (VPN) providers' trust. So, forget no-log VPN policies and welcome "cryptographically verifiable privacy."
The provider launched the app on June 27, 2025, across all major platforms, namely Windows, macOS, Linux, Android, and iOS, and now strives to become the VPN of the future. Yet, not without some controversy.
The problem with no-log policies(Image credit: VP.NET LLC)All the best VPN services currently offer strict no-log policies. These guarantee that the provider never stores any of your identifiable data and are regularly checked with independent no-log audits.
The problem is that even third-party VPN audits require a dose of trust.
"An audit only proves that something was true at that moment in time. This is why we're bringing math and verifiable cryptography back into the mix so that when we say you're private, you're actually private," one of VP.net's founders, Andrew Lee, told TechRadar.
The founder of Private Internet Access (PIA), a popular no-log VPN provider, Lee later realized that many users now need a level of privacy that's not based on trust. He then teamed up with other privacy-committed developers to build a new type of VPN service.
That said, it's worth noting that PIA is among the companies that have proved their no-log claims in real life over the years, doing so not once but twice in court. Another example is Mullvad, which left a police raid empty-handed in Sweden back in 2023.
What VP.net does differentlyThe big novelty with VP.net lies in its tech. The company uses Intel SGX hardware, which promises to deliver "cryptographically verifiable privacy."
For the less techie out there, all you need to know is that all the sensitive operations, those that could somehow reveal your identity, occur in some so-called encrypted enclaves. These are secure and isolated spaces within the software infrastructure that physically prevent the VPN provider from accessing the activities happening inside.
Put it simply, this mechanism should make it "technically impossible to associate your identity with what you do online," explains the provider.
Not only encryption, though; the system also claims to use SGX attestation. This is a security mechanism that assures the encrypted enclaves work as they should, preventing the provider or any other third party from accessing the activities occurring inside. This is "verifiable by clients using Intel's attestation services," said the provider. You can see all VP.net's technical details here.
Crucially, VP.net also offers some protection against the tracking of metadata, meaning all the details that aren't the content. Echoing what NymVPN's innovative mixnet network and Mullvad's DAITA tool do, VP.net also employs some techniques to prevent traffic analysis and obscure actual usage patterns.
(Image credit: VP.NET LLC.)Beyond the novel infrastructure, VP.net also includes all the classic features you'd expect from a VPN.
These include support for the secure and speedy WireGuard protocol, alongside security features like a kill switch and DNS leak protection. Adding post-quantum encryption support is also in the pipeline.
All the apps are fully open-source as well, so that anyone with the technical knowledge can check the code to see if the software behaves as it should. You can take a look at the provider's public repositories by heading to the VP.net GiftHub page.
Is it really bullet-proof?Despite the good premises on paper, Intel SGX tech is certainly not without flaws.
In 2019, for example, a team of researchers discovered a way to run and hide malware on Intel systems. Worse still, this malicious software was undetectable by antivirus tools at the time.
This may be among the reasons why Intel patched multiple security holes in 2023, addressing many existing flaws and vulnerabilities.
Such a security fix certainly doesn't fully convince everyone in the industry, including the CEO of NymVPN, which is another VPN provider seeking to challenge issues with VPN providers' trust. "I prefer decentralization and advanced cryptography rather than believing Intel has produced a silver bullet," NymVPN's CEO, Harry Halpin, told TechRadar.
Another contentious point lies behind the VP.net team. Well-known names from the Bitcoin world, both Roger Ver and Mark Karpelès have had some legal issues in the past.
Commenting on the latter point, Karpelès told TechRadar: "For the way we build the system, there is no need to trust the team behind VP.net. We provide independent systems that verified by itself, as a connection if everything is safe. So, even if I wanted to connect or do anything like that, there's no way I could do anything."
You might also like- Ghost of Yōtei will take around the same time to beat as Ghost of Tsushima
- The game's creative director, Jason Connell, has said both games are "a similar experience" and expects both to be the same "in terms of the time commitment"
- Ghost of Tsushima's main story takes 25 hours to beat, suggesting Ghost of Yōtei will be roughly the same length
Sucker Punch has confirmed that Ghost of Yōtei will take around the same time to beat as Ghost of Tsushima.
That's according to Ghost of Yōtei's creative director, Jason Connell, who told VGC (thanks, GamesRadar) that both games are comparable in length, depending on one's playstyle, because the studio decided to stick with a similar scope to the first game.
"We designed the game with some of the similar numbers, in terms of scale and scope of the last experience, in mind," Connell said. "In that way, we actually found it to be quite satisfying, and there were some good numbers to jump off of."
He continued, saying, "We feel that the experience of playing through Ghost of Yōtei, whether you're just ripping through the story, or you're somebody that likes to just go through the whole world and explore, or you're that hardcore platinum chaser – that it is a similar experience [to that of Ghost of Tsushima], we expect, in terms of the time commitment."
According to How Long to Beat, on average, it takes around 25 hours to beat Ghost of Tsushima's main story, while it takes 62 hours to 100% complete the game, including all side quests and exploration.
Jason Connell's latest comments suggest that Ghost of Yōtei will take around the same time to beat.
Ghost of Yōtei launches on October 2, 2025, exclusively for PS5 and PS5 Pro.
Ghost of Yōtei pre-orders are now live, along with Ghost of Yōtei PS5 bundle pre-orders. If you're looking to get your hands on the exclusive PS5 controller, here's where you can buy the Ghost of Yōtei DualSense.
You might also like...- ExpressVPN issued an update to patch an RDP leak bug discovered by an independent researcher
- The leak in the Windows ExpressVPN client was found in April, in code rolled out in March, so its recent audit could not have spotted the bug
- ExpressVPN considers that "the likelihood of real-world exploitation was extremely low"
The ExpressVPN Windows client app has been updated to patch a leak vulnerability, discovered in April by an independent security researcher.
In a detailed blog post dated July 18, 2025, ExpressVPN – considered one of the best VPNs – confirmed the RDP bug that could have leaked users' real IP addresses, despite stating that "the likelihood of real-world exploitation was extremely low."
Nonetheless, a fix was issued in an update a few days later, meaning the bug should no longer exist, and cannot now be exploited.
What is an RDP leak?(Image credit: sarayut Thaneerat/ via Getty Images)RDP (Remote Desktop Protocol) allows a remote connection from one device to another (typically PC to PC, or PC to server). When an RDP connection is established with a virtual private network (VPN) enabled, the expectation is that the data travels through the encrypted VPN tunnel.
When the data is not encrypted and bypasses the tunnel, it is referred to as a leak. Besides RDP, other encryption-dodging leaks can occur with VPNs, such as DNS leaks.
With this bug, the RDP connection could have been observed by an ISP (Internet service provider), or anyone with network access. Not only was the target IP address not encrypted – enabling an observer to see that a connection to ExpressVPN was running – but it would have been clear that remote servers were being accessed over RDP.
The attack, as demonstrated by researcher Adam-X, would result in the user’s actual IP address being revealed, but not their browsing activity.
The value of a VPN is that all data should be encrypted between the user’s device and the VPN server. While it is possible to manually exclude some apps from the VPN connection, that didn’t happen here. Note, however, that this was a bug in the Windows version of the ExpressVPN desktop client, and did not affect other versions.
Should ExpressVPN's no-log audit have found the leak?This news was announced soon after ExpressVPN published the details of its latest successful no-log audit by KPGM. Should the bug have been detected in the audit, and should users have been informed sooner?
ExpressVPN has stated: “The problem was traced to a piece of debug code (originally intended for internal testing) that mistakenly made it into production builds (versions 12.97 to 12.101.0.2-beta).” They also confirm that Adam-X reported the bug on April 25.
ExpressVPN was audited in February 2025, and solely to ensure that its TrustedServer infrastructure never collects users’ logs as claimed.
Meanwhile, according to Uptodown’s repository of version updates, ExpressVPN production builds 12.97 to 12.101.0.2-beta were issued between March and May.
In short, KPMG’s audit of ExpressVPN’s servers could not have found the bug – even if it was tested for – as this did not exist at the time.
How many users were affected?Most users typically won’t connect to a VPN before establishing an RDP session, so it is unlikely that this affected many users.
ExpressVPN is used mostly by individuals, rather than organizations, so the attack surface of this vulnerability should be minimal. Exploiting the bug also required an attacker to know about it, and to find a way to direct the victim to a malicious website.
The VPN provider has, however, stated that it is introducing more checks to find issues like this before builds are released, and improving automated testing.
ExpressVPN’s response to the bug report – just five days between filing by Adam-X and the first patch – is impressive. But why take so long to share the information publicly? Well, it’s a security matter.
You might also like- Researchers found a new spyware campaign mainly targeting Iranian Android VPN users
- DCHSpy is leveraged by the Iranian cyber espionage group MuddyWater, which is thought to have links with Iran's Ministry of Intelligence and Security
- The campaign started one week after the Israel-Iran conflict began, while VPN demand skyrocketed across the country
Researchers have discovered a new Iran-linked spyware campaign that mostly targets Android VPN users.
The team at security software provider, Lookout, found a new version of DCHSpy, an Android spyware that masquerades as legitimate VPN apps or other applications. This includes Starlink, a satellite internet connection service offered by SpaceX.
The malware campaign, according to experts' findings, was deployed by the hacking group MuddyWater only a week after the Israel-Iran conflict began – exactly when VPN demand skyrocketed in Iran as citizens looked for ways to bypass new internet restrictions.
DCHSpy 2025 – what are the risk?A virtual private network (VPN) is security software that encrypts all internet connections while spoofing a user's real IP address location. The latter skill is exactly what's needed to bypass geo-restrictions like those in place in Iran right now. (Image credit: Shutterstock / HTGanzo)As experts explain, DCHSpy is an intrusive piece of software that can collect users' sensitive information like WhatsApp data, contacts, SMS, files, location, and call logs, while even recording audio and taking photos.
First detected in July 2024, DCHSpy is maintained by MuddyWater hackers, a group thought to have links with Iran's Ministry of Intelligence and Security.
Experts have now discovered four new samples of DCHSpy.
"These new samples show that MuddyWater has continued to develop the surveillanceware with new capabilities – this time exhibiting the ability to identify and exfiltrate data from files of interest on the device as well as WhatsApp data," explains Lookout.
Specifically, hackers appear to be using two malicious VPN services, called EarthVPN and ComodoVPN, as a way to spread the malware.
HideVPN was another fake VPN app previously used to deploy DCHSpy.
These are the malicious VPN apps used by MuddyWater hackers to inject DCHSpy spyware (Image credit: Lookout)According to Iranian Information Security Analyst, Azam Jangrevi, the latest findings are a stark reminder of how sophisticated and targeted mobile surveillance has become.
"What’s especially concerning is its use of trusted platforms like Telegram to distribute malicious APKs, often under the guise of tools meant to protect privacy," Jangrevi told TechRadar.
The risk for Iranians is especially high, considering that, as mentioned earlier, citizens have been increasingly turning to the best VPN apps as the internet becomes increasingly restricted.
How to stay safeJangrevi recommends anyone looking to download a new VPN service, or any other application for that matter, to be vigilant.
"Avoid downloading apps from unofficial sources, even if they appear to offer enhanced privacy. Stick to verified app stores, scrutinize app permissions, and use mobile security solutions that can detect threats like DCHSpy," said Jangrevi.
If you’re in a high-risk region or profession such as journalism or activism, Jangrevi also suggests using hardware-based security keys and encrypted messaging apps vetted by independent researchers.
She said: "This incident underscores the need for greater awareness around mobile threat vectors and the importance of digital hygiene in an increasingly hostile cyber landscape."
You might also like- A signing key that many Linux distributions use to support Secure Boot is about to expire
- Sytems that fail to recognize the new key might fail to boot Linux securely
- Users might need to disable Secure Boot to install or run Linux
A signing key used to support Secure Boot on many Linux distros is about to expire, which could open up devices to all sorts of cybersecurity risks.
Secure Boot is a security feature built into modern computers. It is part of the Unified Extensible Firmware Interface (UEFI), which makes sure that only trusted software can run when the system starts up. This helps block malware such as bootkits, and it relies on digital signatures and keys stored in the computer’s firmware.
In short - UEFI boots up, checks the right software is in place, and hands things over to the operating system.
Locking the database downNow, Microsoft has a signing key that many Linux distributions use to support Secure Boot, and that key is set to expire on September 11, 2025.
A replacement key has existed since 2023, but apparently - many systems don’t support it yet, and for those that don’t recognize the new key, it could mean Linux will not boot securely.
Fixing this problem requires firmware updates from original equipment manufacturers (OEM) but there is a risk that not all OEMs will issue updates - especially those for older, or less popular devices.
There is also a tool called “shim”, which some Linux distros use to work with Microsoft’s Secure Boot infrastructure. It is signed with Microsoft’s (soon-to-expire) key, and if it doesn’t get replaced on time, Secure Boot may break those distros entirely.
As a result, some users might need to disable Secure Boot to install or run Linux, while others may need to manually update firmware, or generate their own keys (which is rather complex and could be risky for those without extensive technical knowledge).
All of this could push people to either stick with Windows, or avoid Secure Boot entirely, which opens up an entirely new can of worms.
Via Tom's Hardware
You might also like- Dior fashion brand hit by cyberattack and customer data leaked - here's what we know
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers
- Predator: Badlands now has a full length trailer
- It reveals that Elle Fanning's protagonist character is a Weyland-Yutani synth
- This is exciting news for those wanting more Alien vs Predator in their life
Predator: Badlands just dropped a new trailer that has delighted fans, including myself, as it incorporates elements of both the Alien and Predator franchises.
Since the original Alien vs Predator movie was released in 2004, we've seen a lot of spinoffs that solely focus on one of the two creatures but now it seems the two universes are properly merging once again.
Xenomorphs are set to reappear in Hulu's upcoming Alien: Earth. Meanwhile, Predator was last seen in Predator: Killer of Killers (check our ranking of every chapter in the animated anthology movie) and before that Prey, which senior entertainment reporter Tom Power called "the best Predator movie since the 1987 original" in his Prey review.
Prey's director Dan Trachtenberg is also directing Predator: Badlands, so many are expecting it to be another very strong entry into the series. Take a look at the trailer for one of this year's new movies below.
What is Predator: Badlands about?The official plot reads: "In the future on a remote planet, a young Predator, outcast from his clan, finds an unlikely ally in Thia and embarks on a treacherous journey in search of the ultimate adversary."
So, this confirms that a Predator and a Weyland-Yutani synth are indeed teaming up in Predator: Badlands, and it's very exciting to see these two worlds colliding again.
Predator: Badlands does have some serious sci-fi vibes in its first trailer, which I'm a huge fan of, and I'm sure there'll be plenty of action and thrills to enjoy whether or not you're team Alien or Predator.
Confirmed cast so far include Elle Fanning as Thia and Dimitrius Schuster-Koloamatangi as Dek (the Predator), and they are definitely shaping up to be one very cool duo.
You might also like- Everything new on Hulu in August 2025 – stream 104 new movies and 68 new TV shows, including Alien: Earth
- I watched Brick on Netflix so you don’t have to – here’s a far superior sci-fi thriller I recommend streaming instead
- Shudder’s new indie sci-fi shocker is one of the most unsettling horror movies I’ve seen in years