If you don't like the idea of dragging the Joy-Con 2 across your desk to access Nintendo Switch 2's mouse controls, it turns out you might not have to.
Michi Ryu, producer on Koei Tecmo's Switch 2 port of Nobunaga's Ambition: Awakening, has revealed that the upcoming game supports traditional USB mice on the new console (via VGC).
Ryu begins the demonstration, which you can watch for yourself in the video below, by playing the game in the Joy-Con 2's mouse mode. “The functionality is the same as the already released Steam version, allowing for left click, right click and wheel operations,” he says.
Around the 11-minute mark in the video, Ryu reveals that a USB mouse has been connected to the Nintendo Switch 2 system, taking priority over the Joy-Con 2 as the main method of control. Ryu can then still use various shortcuts that are mapped to the left Joy-Con 2.
While being able to use a USB mouse on Switch 2 is great news, it's still an unknown as to how widespread mouse support will be with other Nintendo Switch 2 games. For example, I can see USB mouse support being excellent for Civilization 7 and Cyberpunk 2077 on Switch 2.
It is worth noting, though, that some first-party Nintendo games might not be a great fit for traditional mice. That includes Drag x Drive and Metroid Prime 4: Beyond - both of which have rather bespoke mouse control schemes that'll presumably be better suited to the Joy-Con 2 and its extra buttons.
Still, USB mouse support is a great thing to see regardless. It could even open up the possibilities of, say, a Final Fantasy 14 Online or The Elder Scrolls Online ports to Switch 2 - assuming the console also has keyboard support like the original Switch did.
You might also like...Sony is rumored to be working on its next PlayStation handheld console.
That's according to known leaker Jukanlosreve, who has claimed that Sony is currently working on its PlayStation Vita successor, which could be announced by 2028.
Sony is said to be "evaluating a new low-power gaming SoC [System-on-Chip] project", which is being internally referred to as codename "Jupiter", and the company wants AMD to develop it.
"The chip is expected to be developed by AMD and fabricated using Samsung Foundry’s SF2P node, with mass production targeted for post-2028," Jukanlosreve said.
The leaker also stressed that the deal hasn't been finalized yet as it's "still under review between Sony, Samsung, and AMD."
Exclusive: On the Sony PlayStation HandheldSony is currently evaluating a new low-power gaming SoC project—internally referred to as “Jupiter.”⁰The chip is expected to be developed by AMD and fabricated using Samsung Foundry’s SF2P node, with mass production targeted for…May 24, 2025
This isn't the first time we've heard of Sony developing a portable console. In November 2024, it was reported that the PlayStation company was developing a handheld that could run PS5 games natively.
Sources familiar with the project said at the time that the device would compete against the Nintendo Switch and the Xbox handheld that's currently being prototyped, and would be different from its PlayStation Portal.
It was said that the new console wouldn't rely on cloud gaming or remote play and would instead run PS5 games all on its own, like a more powerful PS Vita.
However, like the most recent leak, it was reported that Sony could still decide against bringing the handheld to market, and that it’s still "likely years away from launch."
You might also like...If you're an Android Auto user like me, you'll know there's currently no support for video playback. However, video apps are now on the way to the software, with a useful tweak for those times when your vehicle is on the move.
As spotted by 9to5Google, there's a new clip uploaded by Google to the Android Developers account: it shows the Android Automotive interface switching to an audio-only mode for videos while driving.
Android Automotive is the version of Android Auto that car makers can build into their vehicles, no Android phone required. This platform does already support video apps, but only when the car is parked.
Eventually, these same features should make their way to Android Auto on phones. Last week we got the news that video players are "coming soon" to Android Auto, so let's hope audio-only playback isn't too far behind.
A long time comingI can understand why it's taken a while for video apps to make it to Android Auto, because there's the danger of distracting drivers – and with the software running from a phone, it's harder to detect when a vehicle is actually in motion.
However, I'm glad that Google is getting around to providing support for both video apps and an audio-only mode. As a YouTube Premium subscriber, I watch a lot of videos, and having access to them in my car will add a lot more entertainment to journeys.
Even with the video disabled, I can listen to live music gigs, video explainers, ambient music mixes, video podcasts, interviews, and much more besides. Then when I'm parked up, I can check out the football highlights too.
This is only just being worked on by developers for Android Automotive, so it may be a significant while before it makes it to the consumer version of Android Auto – but I'll be patiently waiting to use it as soon as it appears.
You might also likeOne of the most popular and widely used job portals in India has reportedly been found leaking recruiter email addresses.
A security researcher named Lohith Gowda recently discovered a vulnerability in Naukri’s API for Android and iOS apps, which exposed the recruiters’ email addresses when they were viewing profiles of potential candidates.
Speaking to TechCrunch, Gowda explained what the dangers of this vulnerability were: “The exposed recruiter email IDs can be used for targeted phishing attacks, and recruiters may receive excessive unsolicited emails and spam."
Save up to 68% for TechRadar readers
TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.
Preferred partner (What does this mean?)View Deal
2FA codes and session tokensGowda further stressed that the email IDs can be added to different spam lists and public breach databases, which are sometimes picked up by scraping bots. This, in turn, can lead to automated bot abuse and various scams.
Relevancy and a sense of urgency are key to a successful phishing email.
An attacker might reference an ongoing hiring campaign, a candidate's resume, or a job platform the recruiter uses, to make the email feel timely and legitimate.
Urgency, on the other hand, is how threat actors force the victims into making rash decisions that they later regret.
In this case, these could be claims of a top candidate being about to accept another offer or interview access links that are expiring.
After discovering the flaw, Gowda reached out to Naukri, who then plugged the leak. “All identified enhancements are implemented, ensuring our systems remain updated and resilient,” Alok Vij, IT infrastructure head at Naukri’s parent company InfoEdge, confirmed to TechCrunch. “Our teams have not detected any usual activity that affects the integrity of user data.”
Naukri.com is one of the most popular Indian job sites. According to SimilarWeb, it had more than 28 million unique monthly visits in April 2025, and ranks as the number one job and employment website in the country.
You might also likeThe Ministry of Defence (MOD) recently published a document on 'Secure by Design' challenges that represents something we rarely see in government cybersecurity: a transparent acknowledgment of the complexities involved in implementing security from first principles.
Secure by design is a fundamental approach that embeds security into systems from the very beginning of the design process as opposed to treating it as a bolt-on feature later in development.
Having spent years advocating for the human element in security, it's refreshing to see an official recognition that technical controls are only as effective as the people implementing them.
Addressing the Security Skills ChallengeThe MOD's first identified problem is "How do we up-skill UK defense in 'Secure by Design'?"
Their acknowledgment that effective implementation requires a "one team" approach across UK defense reflects the reality that security cannot be siloed within technical teams.
This aligns perfectly with what I've observed in organizations with mature security cultures—security becomes everyone's responsibility, not just the security department's concern.
The Knowledge Distribution ProblemPerhaps most intriguing is problem two: "How does 'Secure by Design' account for unevenly distributed information and knowledge?"
The MOD correctly identifies that information asymmetry exists for various legitimate reasons. What makes this assessment valuable is the recognition that not all information-sharing barriers stem from poor security culture; some exist by design and necessity.
Imagine a family planning a surprise birthday party for their grandmother. Different family members have different pieces of information that they intentionally don't share with everyone:
The daughter knows the guest list and has sent invitations directly to each person, asking them not to discuss it openly on family group chats,
The son has arranged the venue and catering, with specific dietary requirements for certain guests,
The grandchildren are handling decorations and have a theme they're working on,
And most importantly—nobody tells grandmother anything about any of this.
This isn't because the family has poor communication skills or doesn't trust each other. These information barriers exist by design and necessity to achieve the goal of surprising grandmother. If everyone shared everything with everyone else, the surprise would be ruined.
The MOD's approachIn the MOD's security context, this is similar to how:
Certain threat intelligence can't be shared with all suppliers because doing so might reveal intelligence-gathering capabilities,
Suppliers can't share all their proprietary technology details even with clients like the MOD, as they need to protect their competitive advantage,
Specific security controls might be kept confidential from general staff to prevent those controls from being circumvented.
These aren't failures of security culture—they're intentional compartmentalization that sometimes make security work possible in the first place. The challenge isn't eliminating these barriers but designing systems that can function effectively despite them.
This reflects the nuanced reality of human behavior in security contexts. People don't withhold security information solely due to territoriality or negligence; often, legitimate constraints prevent the ideal level of transparency. The challenge becomes developing systems and practices that can function effectively despite these inherent limitations.
The Early Design ChallengeThe third problem addresses a familiar paradox: how to implement security at the earliest stages of capability acquisition when the capability itself is barely defined.
In other words, it's like trying to build a high-tech security system for a house when you only have a rough sketch of what the house might eventually look like - you know you need protection, but it's difficult to plan specific security measures when you're still deciding how many doors and windows there will be, what valuables will be stored inside, or even where the house will be located. As the MOD puts it, at this stage a capability might be "little more than a single statement of user need."
This connects directly to how humans approach risk management. When primary objectives (delivering military capability) compete with secondary concerns (security), practical compromises inevitably emerge. The MOD's candid acknowledgment that "cyber security will always be a secondary goal" reflects a pragmatic understanding of how priorities function in complex organizations.
Through-Life SecurityProblem four addresses perhaps the most demanding human aspect of security: maintaining security rationale and practice across decades of a capability's lifespan. With defense platforms potentially remaining operational for 30+ years, today's security decisions must make sense to tomorrow's engineers.
The question of continuous risk management becomes particularly relevant as organizations encounter new threats over their extended lifespans. How human operators interpret and respond to evolving risk landscapes determines the long-term security posture of these systems.
Building a Collaborative Security CultureThe MOD recognizes that 'Secure by Design' implementation isn't merely a technical challenge but fundamentally about collaboration among people across organizational, disciplinary, and national boundaries.
The MOD's approach suggests a shift toward a more mature security culture — one that acknowledges limitations, seeks external expertise, and recognizes the complex interplay between human factors and technical controls. Their openness about needing help from academia and industry demonstrates a collaborative mindset essential for addressing complex security challenges.
This collaborative approach to security culture stands in stark contrast to the traditional government tendency toward self-sufficiency. By explicitly inviting external perspectives, the MOD demonstrates an understanding that diverse viewpoints strengthen security posture rather than compromising it.
Security isn't about having all the answers—it's about creating the conditions where people can collaboratively develop appropriate responses to ever-changing threats.
We've compiled a list of the best identity management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Agentic AI is one of the latest concepts in artificial intelligence, now gaining real traction beyond its early buzz. Ongoing advancements in Agentic AI are accelerating the development of autonomous business systems, building on the achievements of machine learning.
Operating as an independent ‘agent’, this technology is equipped to make informed decisions based on the multimodal data and algorithmic logic, and can then ‘learn’ and evolve through experience.
Even more exciting is its capacity to act independently. It’s this unique ability to adapt, plan, and carry out complex tasks without human oversight that distinguishes Agentic AI from earlier generations of AI tools.
In supply chains, for instance, AI agents can track market activity and historical demand trends to forecast inventory needs and implement measures to avoid shortages, such as by automating parts of the restocking processes. These agents shift their behavior in response to changing market conditions, boosting efficiency and performance. It's therefore no surprise that 26% of business leaders report their organizations are beginning to shape strategic approaches around Agentic AI.
However, as great as it sounds to outsource such tasks to Agentic AI, we also need to err on the side of caution. For all its autonomous power, how can the actions and outputs of AI agents be fully trusted? If we rely on Agentic AI to complete sophisticated tasks on its own, how do we ensure its decisions are truly grounded in what’s happening in the real world, or in the enterprise’s view of the world?
In the same way our brains use observation and extra inputs to draw conclusions, AI agents need to rely on a lot of external sources and signals to enhance their reasoning capabilities.
This need can be met by solutions and platforms that collect and present data in a way that’s accessible and retrievable. Here’s how:
The trust challenge in autonomous AI systemsAs discussed, what sets Agentic AI apart from other AI systems is its ability to act autonomously, not just engage in a linear conversation. The complexity of the tasks agents complete typically requires them to refer to multiple, dynamic external sources. As a result, the risk of something going wrong automatically increases. For example, you might trust a chatbot to provide you with an update on the status of a claim or refund, but would you feel as trusting when giving an AI agent your credit card details to book a flight for you?
Away from conversational AI, task-based agents plan and change actions depending on the context they’re given. They delegate subtasks to the various tools available through a process often referred to as “chaining” (the output of one action becomes the input for the next). This means that queries (or tasks) can be broken down into smaller tasks, with each requiring access to data in real-time, processed iteratively to mimic human problem-solving.
The chain effect (in which decisions are made) is informed by the environment that’s being monitored, i.e., the sources of data. As a result, explainable and accurate data retrieval is required at each step of the chain for two reasons. Firstly, users need to know why the AI agent has landed on a particular decision and have visibility of the data source it’s based on.
They need to be able to trust that the action is, in fact, the most effective and efficient. Secondly, they need to be able to optimize the process to get the best possible result each time, analysing each stage of the output and learning from any dissatisfactory results.
To trust an agent to complete sophisticated tasks based on multiple retrieval steps, the value of the data needed to support the decision-making process multiplies significantly.
The need to make reliable enterprise data available to agents is key. This is why businesses are increasingly recognising the power of graph database technology for the broad range of retrieval strategies it offers, which in turn multiply the value of the data.
How graph technology strengthens AI reasoningAs Agentic AI drives decisions from data, the insights underpinning these decisions must be accurate, transparent, and explainable – benefits that graph databases are uniquely optimized to deliver. Gartner already identifies knowledge graphs as an essential capability for GenAI applications, as GraphRAG (Retrieval Augmented Generation), where the retrieval path includes a knowledge graph, can vastly improve the accuracy of outputs.
The unique structure of knowledge graphs, comprised of ‘nodes’ and ‘edges’, is where higher-quality responses can be derived. Nodes represent existing entities in a graph (like a person or place), and edges represent the relationship between those entities – i.e., how they connect to one another. In this type of structure, the bigger and more complex the data, the more previously hidden insights can be revealed. These characteristics are invaluable in presenting the data in a way that makes it easier for AI agents to complete tasks in a more reliable and useful way.
Users have been finding that GraphRAG answers are not only more accurate but also richer, speedier, more complete, and consequently more useful. For example, an AI agent addressing customer service queries could offer a particular discounted broadband package based on a complete understanding of the customer, as a result of using GraphRAG to connect disparate information about said customer. How long has the customer been with the company? What services are they currently using? Have they filed complaints before?
To answer these questions, nodes can be created to represent each aspect of the customer experience with the company (including previous interactions, service usage, and location), and edges to show the cheapest or best service for them. A fragmented and dispersed view of the data could lead to the agent offering up a discounted package when it was not due, leading to cost implications for the business.
As mentioned by the CEO of Klarna, “Feeding an LLM the fractioned, fragmented, and dispersed world of corporate data will result in a very confused LLM”. But the outcome is very different when data is connected in a graph: Positive results have been reported by the likes of LinkedIn’s customer service team, who have reduced median per-issue resolution time by 28.6% since implementing GraphRAG.
Why connected data is key to Agentic AI readinessWith every iteration, the LLMs behind AI agents are advancing quickly, and agentic frameworks are making it easier to build complex, multi-step applications. The next vital move is to make enterprise data as rich, connected, and contextually aware as possible, so it's fully accessible to these powerful agents.
Taking this step allows businesses to unlock the full value of their data, enabling agents that are not only more accurate and efficient but also easier to understand and explain. This is where the integration of Agentic AI and knowledge graphs proves transformational. Connected data gives agents the context they need to think more clearly, generate smarter outputs, and have a greater impact.
We've compiled a list of the best survey tools.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Cybercriminals are abusing a legitimate Google service to bypass email protection mechanisms and deliver phishing emails straight to people’s inboxes.
Cybersecurity researchers KnowBe4, who first spotted the attacks, have warned the crooks are using Google AppSheet, a no-code application development platform for mobile and web apps, and through its workflow automation were able to send emails using the "noreply@appsheet.com" address.
The phishing emails are mimicking Facebook, and are designed to trick people into giving away their login credentials, and 2FA codes, for the social media platform.
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
2FA codes and session tokensThe emails, which were sent in-bulk and on a fairly large scale, were coming from a legitimate source, successfully bypassing Microsoft and Secure Email Gateways (SEGs) that rely on domain reputation and authentication checks (SPF, DKIM, DMARC).
Furthermore, since AppSheets can generate unique IDs, each email was slightly different, which also helped bypass traditional detection systems.
The emails themselves spoofed Facebook. The crooks tried to trick victims into thinking they infringed on someone’s intellectual property, and that their accounts were due to be deleted within 24 hours.
Unless, of course, they submit an appeal through a conveniently placed “Submit an Appeal” button in the email.
Clicking on the button leads the victim to a landing page impersonating Facebook, where they can provide their login credentials and 2FA codes, which are then relayed to the attackers.
The page is hosted on Vercel which, KnowBe4 says, is a “reputable platform known for hosting modern web applications”. This further strengthens the entire campaign’s credibility.
The attack has a few additional contingencies. The first attempt at logging in returns a “wrong password” result - not because the victim typed in the wrong credential - but in order to confirm the submission.
Also, the 2FA codes that are provided are immediately submitted to Facebook and in return - the crooks grab a session token which grants them persistence even after a password change.
You might also like- Officially announced in April 2025
- No release date or trailer revealed yet
- Filming yet to get underway
- Most of the main cast expected to return
- One actor has surprisingly said they won't be back for season 3
- No story synopsis unveiled
- The Last of Us Part II video game offers some clues about its plot
- A fourth and final season could wrap up the story
The Last of Us season 3 is officially in the works at HBO. The incredibly popular TV adaptation was renewed for a third season in April 2025, so we'll be treated to another season of The Last of Us TV show sometime soon.
While we wait for it, there's plenty to keep you occupied. Below, I've covered what we know about The Last of Us' third season so far, including its likely cast and story specifics. I'll also offer my prediction on its launch date and discuss whether a fourth season will be needed to tell the full story depicted in The Last of Us Part II, aka the game on which seasons 2 and 3 are based.
Full spoilers follow for The Last of Us season 2 and the second entry in Naughty Dog's post-apocalyptic video game franchise, so proceed at your own risk.
The Last of Us season 3 release date: what we knowIt can’t be for nothing. Season 3 is coming. #TheLastOfUs pic.twitter.com/q5HxyvK9O6April 9, 2025
As of May 2025, The Last of Us season 3 doesn't have a confirmed release date. Considering the critically-acclaimed HBO TV Original's next season hasn't started filming yet, that isn't a huge shock.
However, I wouldn't be surprised if plenty of pre-production work has already been done. Script work, location scouting, lining up a filming schedule, and many other developmental details have likely been ongoing for months. If they have, I'd be amazed if principal photography doesn't begin in earnest before 2025 ends.
What would that mean for season 3's eventual launch? I think a mid-2027 release is most likely. Season 2 made its debut just over two years after its predecessor ended, so if the series maintains that development trajectory, a June or July 2027 arrival for season 3 isn't out of the question.
The Last of Us season 3 trailer: is there one?We're desperate to see a trailer but, unlike Abby, we won't hold anyone at gunpoint for one! (Image credit: HBO)No. As I said, principal photography hasn't started yet, and even when it gets underway, it'll be a long time before a trailer is released. Once one is, I'll update this section.
The Last of Us season 3 rumored castI expect Bella Ramsey and Isabela Merced to reprise their roles as Ellie and Dina in season 3 (Image credit: Liane Hentscher/HBO)Big spoilers immediately follow for The Last of Us season 2.
Based on how last season ended, here are the actors (and the characters they portray) I expect to see again in The Last of Us season 3:
You might be surprised to see Mazino, Lord, and Barer's names among that contingent. After all, their characters – Jess, Owen, and Mel – died in the season 2 finale.
However, with season 3's early episodes set to jump back in time (read more about this in the story section below), this trio won't have met their demise when the Max show's third season premieres. The same can be said of Gabrielle's Nora, who'll still be alive during the period to be revisited in season 3's opening chapters.
Unless Joel similarly returns in flashback sequences, we definitely won't see Pedro Pascal again. Joel met his end in The Last of Us season 2 episode 2, and, while Pascal reprised his role in last season's sixth episode, that entry depicted the five years between the end of season 1 and the start of season 2. So, don't bet on the fan-favorite actor returning as Joel once more.
There's also the potential for other surprising omissions. Speaking to Variety, O'Hara said she's been told her character, Gail, won't appear in season 3, as it's not likely to spend much time in Jackson, Wyoming, aka the town where Ellie and many of the show's characters live. If Gail doesn't appear, other supporting characters, including Seth and Maria, may not do so, either.
As for newcomers to the series, there are a couple of key characters in The Last of Us Part II who didn't appear in season 2. I won't spoil who they are, but given their importance to the story that'll be told in season 3, you can expect cast announcements about this pair to be made in due course.
The Last of Us season 3 story speculationDon't mind Ellie , she's just taking a quick peek at what's to come in season 3 (Image credit: Liane Hentscher/HBO)Full spoilers immediately follow for The Last of Us season 2 and The Last of Us Part II.
The Last of Us season 3 doesn't have a story synopsis yet. However, based on how its forebear ended – read my article explaining The Last of Us season 2's ending for more on what happened – and The Last of Us Part II's story, we have a good idea of how things will pan out.
As I mention in my ending explainer, season 3 will shift into reverse gear and head back in time 72 hours to the period before and during its predecessor's finale. That's because season 2's final episode ends with a scene starring Abby, which takes place three days prior to her single-handedly storming the Seattle theater where Ellie and company are holed up in the seventh episode.
Season 2's final shot confirms we'll jump back in time in its follow-up season (Image credit: HBO)For those who haven't played The Last of Us Part II, Abby is not only the deuteragonist of that story, but also a player-controlled character for around half of the game's total playtime. Events centered around Abby are integral to telling Part II's full story.
What does that mean for The Last of Us season 3? It'll be Abby-centric, with its opening chapters likely showing us what Abby was up to before Ellie and Dina arrive in Seattle, and then where Abby is during this three-day period.
Part II does this, so there's no reason to suspect HBO's live-action retelling won't take a similar storytelling approach. That being, showing Abby's side of the Seattle-based story, which runs parallel to Ellie and Dina's, before season 2 episode 7's shocking penultimate scene brings them together.
As for what Abby's side of the story entails, I won't spoil anything significant here. But, considering there are a lot of unanswered questions – not to mention narrative gaps that need filling in regarding Abby, her friends, the Seraphites, and the Washington Liberation Front – from season 2, its follow-up has some heavy lifting to do from a narrative standpoint.
Abby's perspective of season 2's Seattle-based events should be depicted throughout season 3 (Image credit: HBO)Thankfully, it sounds like there'll be more time to cover all of the above. Interviewed by Collider in May, co-showrunner and executive producer Craig Mazin said: "I think there’s a decent chance that season 3 will be longer than season 2, just because the manner of that narrative and the opportunities it affords us are a little different."
Of course, that could mean one of the best Max shows' third season only has one more entry (eight) than its predecessor did (seven). Some fans were a little frustrated that season 2 was shorter than the show's debut outing, so an installment with more chapters should appease them. Season 2 included plenty of brand-new material that wasn't seen in the games, too, so season 3 could be approached in the same way and, by proxy, have a higher episode count.
Where can I watch The Last of Us' first two seasons?If you want, you can relive Jesse's shocking death again and again on various streaming platforms (Image credit: HBO)Depending on where you live, The Last of Us' first two seasons are available to stream on different platforms.
In the US, you can watch it on the cable network HBO as well as Max, aka one of the world's best streaming services. Those of you who aren't subscribed to the streamer should read our Max price guide to see how much it costs to sign up and our Max free trial article to learn if you can try it before you buy.
Meanwhile, UK audiences can catch it on Sky Atlantic and Now TV. Australian viewers can also tune into Max to watch both seasons, but if you're not signed up to Warner Bros. Discovery's super streamer, you can also catch it on Foxtel.
Will The Last of Us end with its third season?We won't evoke our inner Isaac and torture people for information on whether a fourth season will be made, either! (Image credit: HBO)It's not been officially confirmed yet, but The Last of Us season 3 isn't expected to be the final installment.
The Last of Us seasons 2 and 3 were supposed to tell the full story depicted in The Last of Us Part II. But, speaking in February, HBO TV chief Francesca Orsi indicated that HBO's adaptation of The Last of Us could run for four seasons.
In the same Collider article I linked to in this guide's plot section, Mazin also remarked that "there’s no way to complete this narrative in a third season. Hopefully, we’ll earn our keep enough to come back and finish it in a fourth". It sounds like another season could be in the offing after the show's third entry, then.
Fans will be hoping that they see Tommy again in season 3 and, potentially, a sequel season (Image credit: Liane Hentscher/HBO)But how will Mazin and company stretch out The Last of Us Part II's story across three seasons Initially, I suspected that, if The Last of Us Part II's story was wrapped up in season 3, a fourth and final season might include plot elements that Naughty Dog may have been considering for The Last of Us Part III.
Right now, a third entry in Naughty Dog's incredibly popular video game franchise hasn't been announced. Naughty Dog president Neil Druckmann has also said fans shouldn't "bet on there being more" – i.e. the continuation of Ellie's story in another game – anytime soon.
Druckmann and his inner circle are the only ones who know if more than a story concept was ever devised for Part III. Nonetheless, if a third game isn't going to be made, there's no reason why its plot elements can't be fleshed out and depicted in HBO's TV adaptation instead.
That said, speaking on episode 457 of the Sacred Symbols podcast, Druckmann indicated that, if a fourth season is greenlit, it'll simply wrap up the story told in Part II. The potential inclusion of brand-new material set during events of that game (and, by proxy, its TV adaptation) aside, then, don't expect a possible fourth season to contain post-Part II narrative beats.
For more Max TV show-based coverage, check out our guides on House of the Dragon season 3, Peacemaker season 2, Creature Commandos season 2, and The White Lotus season 4.
Hackers are posting AI-generated videos on TikTok to trick users into downloading infostealing malware, cybersecurity researchers Trend Micro have warned.
The premise is simple: the attackers use AI to generate numerous videos demonstrating how to easily “activate” Windows and Microsoft Office, or enable “premium features” in apps such as Spotify or CapCut.
They then share these videos on TikTok, whose algorithm makes it more likely to turn the video viral, making the success of the attack more likely.
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
A new spin on old tricksIn the clip, a person is shown bringing up the Run program on Windows, and then executing a PowerShell command.
While in the video the command results in the activation of special features, in reality, users running the command would download a malicious script which, in turn, deploys Vidar and StealC infostealers.
These infostealers can take screenshots, steal login credentials, grab credit card data, exfiltrate cookies, cryptocurrency wallet information, 2FA codes, and more.
"This attack uses videos (possibly AI-generated) to instruct users to execute PowerShell commands, which are disguised as software activation steps. TikTok's algorithmic reach increases the likelihood of widespread exposure, with one video reaching more than half a million views," Trend Micro said.
"The videos are highly similar, with only minor differences in camera angles and the download URLs used by PowerShell to fetch the payload," the researchers added.
"These suggest that the videos were likely created through automation. The instructional voice also appears AI-generated, reinforcing the likelihood that AI tools are being used to produce these videos."
One of the videos has roughly 500,000 views, more than 20,000 likes, and more than 100 comments, making it quite successful.
Videos were being used to deliver malware in the past, too, but this new campaign is a significant departure from earlier methods.
The difference is that before, the link to the malware was shared in the video’s description, or comment, where it could still be picked up by security solutions. By delivering the bait in a video format, the attackers successfully bypass almost all security measures.
Via BleepingComputer
You might also likeIt's a lot of pressure to be one of the reigning best streaming services, but that never phases Netflix. When it comes to the new Netflix titles for June 2025, there are many reasons to get excited, too.
Leading the charge is one of the best Netflix shows ever made – that being, Squid Game. All episodes of Squid Game season 3 come to Netflix on June 27, which not only marks the conclusion of the incredibly popular survival drama, but also means it's a shoo-in to be one of the most-watched shows of the month.
There are plenty of new Netflix movies up the streaming giant's sleeve as well. Indeed, it's packed a large number of classic horror movies into its line-up for the month, including The Birds (1963), and modern thrillers in Us (2019) and Barbarian (2022).
There's plenty more where that came from, so read on to see what else is launching on the platform between June 1 and June 30.
Everything new on Netflix in June 2025Arriving on June 1
The American (movie)
Barbarian (movie)
Bee Movie (movie)
The Birds (movie)
The Blues Brothers (movie)
The Devil's Own (movie)
Dune (1984) (movie)
The Equalizer (movie)
Family Plot (movie)
Focus (movie)
Frenzy (movie)
The Great Outdoors (movie)
Hitchcock (movie)
Hop (movie)
The Legend of Zorro (movie)
The Man Who Knew Too Much (movie)
Neighbors (movie)
Now You See Me (movie)
Now You See Me 2 (movie)
The Nutty Professor (movie)
Pokémon The Series: XY (TV show)
Pokémon The Series: XY: XY: Kalos Quest (TV show)
Pokémon The Series: XY: XYZ (TV show)
Rear Window (movie)
The Theory of Everything (movie)
The Town (movie)
U-571 (movie)
Us (movie)
Vertigo (movie)
Arriving on June 3
Sara - Woman in the Shadows (Netflix original series)
Arriving on June 4
Criminal Code season 2 (Netflix original series)
Eva Lasting season 3 (Netflix original series)
Power Moves with Shaquille O'Neal (Netflix original series)
Arriving on June 5
Barracuda Queens season 2 (Netflix original series)
Ginny & Georgia season 3 (Netflix original series)
Tires season 2 (Netflix original series)
Arriving on June 6
K.O. (Netflix original movie)
Mercy For None (Netflix original series)
TYLER PERRY'S STRAW (Netflix original movie)
The Survivors (Netflix original series)
Arriving on June 7
Boys on the Side (movie)
Piece by Piece (movie)
Arriving on June 9
The Creature Cases chapter 5 (Netflix original series)
Arriving on June 10
Families Like Ours (Netflix original series)
Trainwreck: The Astroworld Tragedy (Netflix original documentary)
Arriving on June 11
Aniela (Netflix original series)
Cheers to Life (Netflix original movie)
Cocaine Air: Smugglers at 30,000 Ft. (Netflix original documentary)
Our Times (Netflix original movie)
Titan: The OceanGate Disaster (Netflix original documentary)
Arriving on June 12
The Fairly OddParents: A New Wish season 2 (TV show)
FUBAR season 2 (Netflix original series)
Plane (movie)
Arriving on June 13
Kings of Jo'Burg season 3 (Netflix original series)
Arriving on June 14
Grey's Anatomy season 21 (TV show)
Arriving on June 16
The Last Witch Hunter (movie)
Arriving in June 17
Justin Willman: Magic Lover (Netflix original comedy)
Kaulitz & Kaulitz season 2 (Netflix original series)
Scandal seasons 1-7 (TV show)
Trainwreck: Mayor of Mayhem (Netflix original documentary)
Arriving on June 18
AMERICA'S SWEETHEARTS: Dallas Cowboys Cheerleaders season 2 (Netflix original series)
Rosario Tijeras (Mexico) season 4 (Netflix original series)
Somebody Feed Phil season 8 (Netflix original series)
YOLANTHE (Netflix original series)
Arriving on June 19
The Waterfront (Netflix original series)
Arriving on June 20
KPop Demon Hunters (Netflix original series)
Olympo (Netflix original series)
Semi-Soeter (Netflix original movie)
Arriving on June 22
The Intern (movie)
Arriving on June 24
Steph Tolev: Filth Queen (Netflix original comedy)
Trainwreck: Poop Cruise (Netflix original documentary)
Arriving on June 25
The Ultimatum: Queer Love season 2 (Netflix original series)
Arriving on June 27
Pokémon Horizons season 2 - The Search for Laqua part 3 (Netflix original series)
Squid Game season 3 (Netflix original series)
A cybercrime story is never far from the news. Last month M&S was the latest in a growing line of high-profile institutions to suffer from a cyber attack.
State-sanctioned practices, coupled with the growing use of AI and emerging technologies, are creating a complex cybercrime scene with a minefield of risks. It’s why the NCSC warned of a growing gap between cyber threats and defense capabilities last year, reporting a threefold increase in severe incidents compared to the year before.
With threats appearing from all angles, law enforcement agencies, financial institutions, and businesses alike are all in need of efficient tools and processes to squash these threats. And one of the answers could lie in open source intelligence (OSINT).
What is OSINT?With criminals hiding behind fake identities and information spread over many sources, OSINT is proving to be a highly effective mechanism, mobilizing publicly available data in the fight against cybercriminals.
OSINT is the targeted collection and analysis of publicly available or licensable data to produce actionable insights.
One of the key steps to defining OSINT is recognizing how it differs from OSINF – open source information. OSINF is publicly or commercially available information located in sources such as news publications, social media, online forums and corporate registries (like Companies House). Naturally, this data can be biased and unregulated, meaning its insights are limited on their own.
OSINT is the product of collecting, combining and analyzing OSINF. It produces actionable intelligence and can draw out insights that are not always apparent in the raw data. Given the number of internet users has doubled over the past ten years, there has never been such a volume and range of this data – and therefore never more of an opportunity to get insights out of OSINT.
Who uses it?While traditionally employed by government intelligence agencies, the use of OSINT has spread to other public sector bodies, financial institutions, large corporates and media outlets to derive insights not available through other sources of intelligence.
For banks and corporates, for example, regulations like the EU’s sixth anti-money laundering directive (part of its AML package) or its corporate sustainability due diligence directive require institutions to conduct robust due diligence on their customers and supply chains. This is to protect the market against risks such as unknowingly engaging with people who are facilitating money laundering or potential business partners who have adverse human rights and environmental impacts.
OSINT helps to cast a light on these hidden risks and identify connections between companies or people, making it an ideal tool for fighting complex, network-based crimes. It can play a lead role in use cases such as anti-money laundering and organized crime investigations.
So, whether investigators are reviewing publicly available social media content to learn more about a sanctioned entity’s assets or finding connections to possible shell companies in corporate records, this open source data can be harnessed to provide critical intelligence to crime fighters.
Unmasking criminals: How OSINT tackles cybercrimeOf course one of the main objectives of criminals is to remain undetected. And from fake profiles to the dark web (more on that soon), the internet has provided cybercriminals with a variety of ways to act anonymously and mask their identities. So, OSINT for cybercrime is all about finding the real-world identities behind the perpetrators. But how can it help to unmask criminals?
OSINT offers major benefits to investigating cybercrime by giving investigators the means to uncover insights not available anywhere else. For example, by analyzing where the same usernames are used across the web, investigators can begin to draw connections to a suspect’s real-world identity.
Cybercriminals operate in the online world, so OSINT is perfectly suited to fighting them. Sources such as internet forums and publicly available social media accounts are exactly the places where bad actors may have scattered breadcrumbs concerning their identity or operational activities.
Then there is the dark web. This is a key gateway for criminals, and therefore a key data source for investigators. Criminals talk more freely about their activities there, whether they are sharing personal data from cyberattacks or describing their techniques. But as the dark web involves using another browser, it isn’t easily accessible through normal web browsing techniques and accessing it can be an extremely risky process.
OSINT platforms can provide a secure ecosystem for investigators to tap into dark web resources, as well as improving security when reviewing publicly available social media and other web sources. By being able to uncover leaked data or messages on dark web forums in a safer environment, investigators can understand the nature of stolen information or start to map out criminal networks. And by assessing correlations between forum posts, profile images and metadata across dark and surface web, they may ultimately find real-world identities behind criminals.
Crucially, this can provide organizations with insights to prevent future attacks and plug security gaps.
OSINT: A fearsome defenderNearly every crime has a financial motivation in some manner. Cybercrime facilitates different forms of crime such as fraud and money laundering, but these are distinctions that criminals do not make. Consequently, the organizations using OSINT to fight back against cybercrime are also playing their part in dismantling systems that fund broader criminal activity.
More cybercrime stories will hit the news this year, adding to the multitude of threats presented by cybercriminals. It will be more critical than ever that investigators have the right tools to understand the huge volumes of unstructured data available online - and use it to identify and disrupt criminal networks.
OSINT lets investigators take full advantage of publicly available data and turn it against cybercriminals. Whether it’s government agencies investigating serious and organized crime or banks adhering to compliance requirements, the technique allows investigators to use a wide range of publicly available sources – including the dark web – to connect the dots and unmask the real-world identities of cybercriminals.
We've featured the best online cybersecurity course.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
I’ve worked in SEO for over a decade, and I can say with confidence: ecommerce brands have never had it tougher than they do right now when it comes to organic visibility.
Not because SEO is dying, but because the SERP (Search Engine Results Page) is undergoing a major transformation, whether we like it or not.
In 2024, we’ve seen a major shift in how search works. AI Overviews, Shopping Ads, and rich Google SERP features are no longer just experimental additions, they’re dominating the search experience, particularly on mobile.
Recent data from AccuRanker confirms what many in the industry have felt for months: ecommerce click-through rates (CTR) for organic results are nosediving, especially for high-intent transactional keywords.
The good news?
There’s still a path forward, but it requires e-commerce brands to rethink their approach to SEO completely.
In this article, I’ll break down what’s happening to organic traffic, why traditional SEO tactics are losing ground, and four ways ecommerce brands can adapt to stay visible and competitive.
The data: CTRs are down, especially on mobileAccuRanker’s latest white paper examined how organic listings perform across various devices and user intents. The findings were stark:
1. CTR for transactional keywords is down across the board, with mobile suffering the biggest drops.
2. Even in the absence of paid ads, rich SERP features, such as “Popular Styles,” “Shop the Look,” image carousels, and AI Overviews, dominate the top of the page.
3. On mobile, organic CTRs are up to 50% lower than desktop for the same keywords.
In short, ranking #1 still has huge value, it just doesn’t guarantee the same volume of clicks it once did.
The rise of zero-click search, where users get answers directly within Google's interface, means that even top-performing organic listings are seeing reduced traffic, not because SEO is ineffective, but because more users are engaging with SERP features before ever scrolling.
Why e-commerce SEO is under pressure1. AI overviews are reducing the need to click
Google’s AI Overviews, which have now rolled out globally, are designed to answer user queries instantly, often pulling product suggestions from the Google Shopping Graph or summarizing content from multiple sources.
For informational or top-of-funnel searches (e.g., “best hiking boots for wet weather”), this used to be prime SEO real estate. Brands would publish buying guides or product roundups and earn high CTRs.
Now?
AI Overviews often display product suggestions directly in the search result, removing the need to visit a third-party site entirely.
2. Google Shopping is consuming the SERP
Google Shopping Ads and organic Shopping features are everywhere, even when you don’t pay for them.
SERP features like:
...are now appearing even when no paid Shopping Ads are present. They pull directly from merchant feeds and product schemas, providing Google with a visually rich, shoppable experience and reducing the likelihood that users will need to visit traditional listings.
This means traditional organic category and product pages are often buried below these features, especially on mobile, where screen real estate is limited.
3. SERP features create more competition for attention
Google’s obsession with rich features means your listing isn’t just competing with other brands; you’re competing with Google itself.
Here’s a rough example of what now appears above most organic ecommerce listings:
Each one reduces the chance of a user clicking through to your site, even if you’re sitting at position #1.
What can e-commerce brands do about it?So, how do you fight back when Google keeps pushing your organic listings further down the page?
Here are four core strategies we’re implementing with ecommerce clients right now that are helping them remain visible and competitive in an AI-dominated SERP:
1. Leverage digital PR to boost brand recognition and CTRWith organic visibility declining, brand recognition is more important than ever.
When users see your name in a cluttered SERP, familiarity can be the difference between a scroll and a click. And that’s where Digital PR comes in.
Digital PR isn’t just about backlinks, it’s about building authority and visibility across trusted publications and media outlets. These mentions not only enhance your brand strength but also increase brand recall when users encounter your listing in search results.
Action steps:
- Secure top-tier backlinks and mentions in industry publications.
- Promote branded content on platforms your audience trusts.
- Ensure that when your site does appear in search, users recognize and trust the brand enough to click.
2. Build digital authority outside of GoogleThis is the era of Digital Authority PR, where it’s not just about where you rank, but where else you show up that influences both human behavior and algorithmic trust.
Google’s AI Overviews and LLM-powered tools, such as Gemini, Chatgpt, and Perplexity, rely heavily on high-authority, frequently cited web content to generate responses. That includes trusted blogs, media outlets, and other widely referenced sources that are publicly accessible.
Brands that appear in well-cited articles, contribute expert commentary, or are mentioned on platforms with crawlable transcripts, like YouTube videos with descriptions, Reddit threads, or podcast blogs, increase their chances of being referenced by AI tools in the future.
If your brand is absent from these ecosystems, you may not show up in AI-generated responses, even if you rank well in traditional search.
Action steps:
- Get featured on niche podcasts, relevant YouTube channels, and Reddit threads.
- Contribute expert commentary to high-authority blogs and newsletters.
- Create thought leadership content that answers key audience questions, content that LLMs might pull into future AI Overviews.
3. Optimize for SERP features — not just rankingsIt’s no longer enough to optimize for keywords. You need to optimize for the features Google is displaying.
That means treating your product feed and structured data with the same care you give your on-page SEO.
Action steps:
- Keep your Google Merchant Centre feed up to date. Product titles, descriptions, availability, pricing, reviews, and images all influence whether you appear in organic Shopping features.
- Implement a comprehensive product schema, including price, availability, reviews, and brand information.
- Use the FAQ schema carefully; it’s less likely to impact AI Overviews now, but still useful for People Also Ask boxes.
- Ensure your site loads quickly, looks clean on mobile devices, and features rich media (e.g., lifestyle product photos).
Optimizing for these SERP features gives you multiple entry points into the search experience, not just the traditional 10 blue links.
4. Shift from lead capture to demand generationWith fewer clicks available, you can’t just wait for users to search and find you; you need to create demand.
This involves building awareness through paid social, influencer marketing, and content campaigns that encourage users to search for your brand directly or convert through other channels.
Action steps:
- Use paid social media to promote new product launches and seasonal offers.
- Partner with creators and influencers to drive awareness.
- Nurture audiences through email and remarketing to bring them back, even if the initial discovery wasn’t from Google.
SEO is no longer the sole driver of e-commerce growth. It's part of a larger demand generation ecosystem.
The AI search shift is just beginningCurrently, Google dominates the search market, but the rise of AI-powered tools is reshaping the playing field.
While SparkToro data shows that tools like Chatgpt haven’t yet displaced Google for consumer searches, we’re seeing early signs that users are increasingly relying on AI tools for discovery and research, particularly for complex or multi-step decisions.
That means now is the time to future-proof your presence. By showing up in trusted places, publications, podcasts, and social conversations, you increase your brand’s visibility in LLM training data and improve your odds of inclusion in AI-generated content.
The brands that adapt early will build long-term authority that can’t be gamed or reverse-engineered overnight.
Final Thoughts: SEO Isn’t Dead — But the Playbook Is
Yes, e-commerce click-through rates are declining, and yes, organic rankings don’t deliver what they used to.
But this isn’t the end of SEO. It’s a sign that SEO needs to evolve.
The brands winning today are doing more than optimizing their websites. They’re building authority, showing up in high-trust ecosystems, and future-proofing their visibility for an AI-driven future.
SEO in 2025 isn’t just about where you rank. It’s about where you’re recognized.
We've featured the best online marketing service.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: NYT Strands hints and answers for Monday, May 26 (game #449).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #450) - hint #1 - today's themeWhat is the theme of today's NYT Strands?• Today's NYT Strands theme is… A strange new world
NYT Strands today (game #450) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
• Spangram has 14 letters
NYT Strands today (game #450) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?First side: left, 1st row
Last side: right, 5th row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #450) - the answers(Image credit: New York Times)The answers to today's Strands, game #450, are…
Today we were looking for three pairs of words that made up the titles of DYSTOPIAN NOVELS (Animal Farm, Hunger Games, and Handmaid’s Tale) – not that I realized this initially.
It wasn’t until I got ANIMAL and connected it to FARM that the penny dropped. Before then I wasn’t sure what the theme “a strange new world” meant.
A dystopian novel is defined as a story set in a fictional society or world often characterized by an oppressive regime and governmental or religious control after a collapse of some sort.
As is the case with all three of today’s choices, they also reflect the time in which they were written and carry warnings about possible futures when we’ll be too busy trying to survive to pass the time on word puzzles.
How did you do today? Let me know in the comments below.
Yesterday's NYT Strands answers (Monday, May 26, game #449)Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.