Sandfall Interactive has confirmed that Clair Obscur: Expedition 33 is the first game in a new franchise.
Speaking with YouTube channel MrMattyPlays (via TheGamer), game director Guillaume Broche revealed that Expedition 33 is "not the end" of the series.
"Clair Obscur is the franchise name," Broche said. "Expedition 33 is one of the stories that we want to tell in this franchise. Exactly what it will look like and what the concept will be is still too soon to announce, but what is sure is that this is not the end of the Clair Obscur franchise."
Broche couldn't reveal any more details, but did hint later on in the interview that he tends to forget his previous work when he "writes sequels," suggesting the studio's next game won't be a direct sequel.
Elsewhere in the discussion, Broche was asked about the possibility of Clair Obscur receiving any post-launch downloadable content (DLC). While the game director didn't outright say "Yes", he did tease Sandfall's plans, saying "There may be," and it's "a bit too early to say."
"We may be cooking," he added (thanks, PC Gamer).
Sandfall has previously stated that it was "exploring a wide range of future improvements" including accessibility features, "new content", and "all sorts of bits and bobs".
Just last month, the studio released an update that added a Battle Retry feature.
You might also like...In an age where cybersecurity threats dominate headlines and sustainability tops boardroom agendas, enterprise IT disposal practices are under renewed scrutiny. For years, physically destroying end-of-life hardware - shredding hard drives, crushing servers - was the default method to guarantee data couldn’t be recovered. It felt final. Reassuring. Safe.
But that instinct is now being questioned. According to new research, there’s a growing disconnect between how organizations dispose of data-bearing assets and the financial, environmental, and compliance pressures they now face. Many still default to destruction, even as that approach becomes harder to justify—financially, ethically, and environmentally.
The cost of destructionThe financial argument against destruction is becoming harder to ignore. While physical destruction feels secure, it comes with a hidden bill. There are the direct costs of certified physical destruction services. Then there are indirect losses - reusable or resalable hardware is destroyed, prompting early replacements.
Just 22.3 % of the 62 million tons of e‑waste generated in 2022 was formally collected and recycled - a figure projected to fall to 20 % by 2030 as disposal volumes continue to outpace recycling efforts.
Latest industry research shows that 67% of organizations still rely on physical destruction for SSDs and HDDs, despite the financial and environmental drawbacks.
If a large enterprise refreshes its servers every three years, destroying even a portion instead of reselling or redeploying them can waste millions over a typical lifecycle. At a time when budgets are under constant pressure, that scale of waste is increasingly hard to defend.
As Techbuyer COO Mick Payne told the FT, he once offered a six-figure sum to buy and wipe thousands of used drives at a London data center - only to watch them get shredded instead. “It was a complete waste.”
And the financial toll is just one part of the problem - the environmental cost of destruction is just as severe.
The environmental tollBeyond the financial impact, physical destruction takes an enormous toll on the environment. In 2024, UK households purchased over 1.14 billion small electronic devices - often referred to as "fast tech", with approximately half (589 million) discarded within the same year. And business waste is also significant.
Research shows UK businesses discarded up to 200,000 tons of electrical equipment, including laptops and servers, in just one year, with only about 108,000 tons entering proper recycling streams through authorized treatment facilities.
Destroying equipment removes the chance to recirculate valuable materials; from copper and aluminum to rare earth metals - triggering further mining, processing, and manufacturing fresh parts, dramatically expanding the carbon footprint of every new device.
As more businesses face scrutiny over their carbon reduction claims, sending reusable equipment straight to the shredder increasingly looks incompatible with their public commitments.
A proven alternativeFor many IT leaders, the sticking point is data security. If a hard drive is destroyed, there is zero risk of data recovery - simple. But certified data erasure, or sanitization, now provides equivalent security while preserving the hardware for reuse.
Certified software-based erasure methods comply with international standards such as NIST 800-88, and meet the UK GDPR’s data protection requirements for safe disposal of personal information (ICO). These techniques ensure data is permanently overwritten and unrecoverable, even with advanced forensic methods.
The Information Commissioner’s Office specifically highlights secure overwriting as an approved, robust form of data destruction that includes a full audit trail, critical for regulated sectors like finance and healthcare.
Rather than destroying valuable drives, enterprises retain certified, clean assets that can be redeployed internally or sold on the secondary market, extracting further ROI.
Why the change is acceleratingThree powerful forces are accelerating this rethink. Globally, businesses are under mounting stakeholder pressure to prove their environmental credentials. The UK government’s sustainability strategies, including its commitment to a more circular economy, explicitly encourage reuse and refurbishment over destruction.
Second, the economic picture is shifting. According to Gartner, worldwide IT spending is projected to reach $5.61 trillion in 2025, an increase of 9.8% compared to 2024. This surge reflects a growing investment in digital transformation and advanced technologies - but it also means CIOs will be under pressure to maximize ROI.
Reselling or redeploying equipment can help extend budgets further, while destruction locks in a sunk cost, wasting the opportunity to capture residual hardware value and reinvest in innovation.
Third, the maturity of secure erasure technology has eliminated previous technical barriers. Until recently, many organizations avoided software-based erasure due to concerns around reliability and compliance. Today, however, certified erasure tools are globally trusted - backed by regulators, embedded in industry standards, and proven to deliver the same level of data security as physical destruction.
Time to break the habitThere will always be rare cases where physical destruction is necessary - such as devices exposed to state-level espionage. But for most enterprise assets, secure sanitization offers the same peace of mind without the destruction.
By moving away from blanket destruction, businesses can reduce emissions, cut unnecessary costs, and demonstrate a more responsible, circular approach. They’ll also be better prepared for tighter regulation and rising ESG expectations.
In short, “destroy first, ask questions later” is an outdated reflex. Today, secure data sanitization lets businesses shred less and save more - protecting both budgets and the planet.
We've featured the best green web hosting.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
AI, like any technology, is neither inherently good nor bad. As always, it depends on who is using it and what they’re using it for. However, what is undeniable is that AI is evolving faster than its risk averse cousin, regulation, as legislators continue to struggle to keep pace.
Of course, it doesn’t help that AI is innovating within AI, which is in turn leading to unprecedented acceleration in technological development.
All of this is creating a new set of security challenges, the latest of which is vibe coding. As with any innovation cycle within AI, it’s critical that we understand what it is, and what the security implications are.
Vibe coding explainedAt its core, vibe coding is a modern approach to software development. This shift is best understood through the changing role of the software developer. Previously, a developer would have been tasked with manually writing each line of code, before commencing the usual process of inspecting, testing, fixing and launching.
Now, with the introduction of vibe coding, a software developer – and your average Joe – is able skip the first step, have AI write the code in their stead, and simply guide, test, and refine it.
On paper, the benefits are plain to see. Devs can work more efficiently, it democratizes and opens up the act of coding beyond trained developers, and encourages creativity and experimentation, with new consumer-facing applications being created that are intuitive and easy to use.
Even Google’s CEO, Sundar Pichai has been having a go, stating that “it feels delightful to be a coder”, after letting slip that he had been playing around with building a web app.
As with any AI innovation – and given the ever-growing accessibility of AI tools – it comes to the forefront of the industry, habits change, and new tools and companies are developed. Just a few weeks ago, vibe coding company Lovable was in talks for a $1.5 billion valuation.
What’s clear is that you can’t stop the tide. It’s about working with it, building suitable guardrails and managing the associated risks appropriately. But what are these risks?
The security risksAs equally as vibe coding can be used for innovative purposes, it can also perpetuate cyber threats. To be robust in today’s threat landscape, businesses require secure, compliant, and maintainable code. The reality is that malicious code does not need to be high quality or long-lasting to have an impact.
In today’s AI-driven threat landscape, bad actors can even use verbal commands to generate malicious code and target vulnerabilities. To extrapolate this issue one step further, AI agents will add another dangerous dimension.
While generative AI can provide coding capabilities as part of vibe coding, it still needs to be deployed and executed in isolation. That is until an AI agent takes on the responsibility.
Vibe coding also has the potential to cause issues within security teams themselves. Often, it’s done individually, therefore undermining the collaborative and agile nature of DevOps practices. Without structured programming and security awareness, vibe coding can introduce hidden risks.
Defensive strategiesVibe coding represents a leap in abstraction, allowing programmers to generate code using natural language. And while it lowers the barrier to entry and democratizes access to coding, it ultimately increases the risk of misuse by unqualified users. Businesses must set themselves up with a long-term view.
Vibe coding is just the latest iteration of AI-driven attacks and while it’s easy to focus on the technology of the moment, organizations must be set up to defend against vibe coding and whatever the next innovation may be.
The first and foremost defensive strategy is deploying zero trust architecture. At its core, Zero Trust is a security process that assumes that no entity should be trusted by default, even if within the network perimeter. The old adage of “if you can reach it, you can breach it” rings true here, so by reducing or removing your attack surface you’re going a long way to protecting yourself.
Secondly, there’s incredible value in platform-based technologies. The intelligence that platform providers get from serving millions of customers is invaluable. Think of it somewhat like herd immunity. If a solution is applied to one, it is applied to the many. Essentially, you’re benefiting from the participation of others in the platform model.
Finally, it’s vital that businesses be proactive in security, shifting from defense to offence, or as we like to call it threat hunting. By mitigating risk before it escalates, enterprises can improve their overall security posture.
Looking aheadUltimately, due to reasons like cost efficiency, AI will continue to disrupt the ways that we work and therefore influence the ways that we protect ourselves against the evolving threat landscape. In the future, vibe coding might involve multiple AI agents handling different aspects of the process, with one agent for pillars such as creativity, security, and the structure.
Security when done right can be a revenue enabler, allowing for market expansion, agility and better business practices. When done poorly, it renders businesses vulnerable to the latest AI innovation and trend. By adopting a long-term view of the threat landscape, deploying Zero Trust and taking a proactive approach to their security posture, enterprises can thrive.
We've featured the best online cybersecurity course.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
A creator’s Instagram inbox used to be a beautiful mess. One minute it was quiet. The next, a product Reel pops off and they get buried in fire emojis, product questions, and a dozen “Is this still in stock?” DMs.
It was certainly exciting. And a bit overwhelming? Manually keeping up often meant lost sleep, missed sales, and a lot of copy-pasting.
But now, that chaos is being turned into opportunity: For creators and entrepreneurs alike, the DM is the new storefront, help desk, and loyalty engine, all rolled into one. It's where trust is built, products get discovered, and sales happen at the speed of a double tap.
As conversational commerce takes off, more creators and entrepreneurs are building entire revenue engines inside their DMs. And equipped with smart automation, they’ve honed their social platforms to evolve beyond customer engagement to driving discovery, conversion, and customer loyalty in real time.
Historically, traditional businesses have enjoyed a rich ecosystem of tools, whether that be automations, webhooks, email integrations, and marketing funnels. They made scaling and systematizing their customer journeys seamless. Social media, by contrast, was long a closed garden: a powerful engagement space but one that limited creators’ ability to fully build and scale businesses because of restricted access.
But that’s all changing. Social platforms are opening up, and integrating with search engines and third-party tools. Creators and entrepreneurs can build sophisticated marketing and sales systems within these once closed environments – meaning social media channels are ultimately leveling the playing field. They’re transformed into robust business platforms where engagement, discovery, and conversion seamlessly intertwine.
From clicks to conversations, why funnels are flatteningThe old-school path to a sale was long: social post → link in bio → website → maybe a sale. But let's face it, we’re living in the age of instant gratification. People expect responses yesterday. Slow replies can lead to frustration, while quick, helpful answers leave a lasting impression.
Enter: automation.
Automation ensures no message gets lost, keeping your audience happy and engaged. It's reshaping the sales funnel. Instead of sending traffic away, creators are closing the loop inside the platforms themselves, often in one message. In fact, 71% of consumers say they expect to interact with brands via messaging platforms. And with an average response time of 2 minutes (vs. 17 hours for email), DMs are simply faster and smarter.
To be clear, this shift isn’t about ditching websites. Rather, brands need to meet their buyers where they’re at – and remove the friction between intent and action. DMs essentially pre-qualify intent to purchase. By the time a consumer clicks through to a link provided via DM, they’re warmer and more likely to convert.
And the numbers back it up. Some creators report conversion rates as high as 85–98% when routing sales through DMs. Others have seen revenue spike by tens of thousands of dollars in a single month, simply by automating responses they once handled manually. One campaign helped drive over 100,000 page views from just a single trigger. These are all proof that messaging is a real growth engine.
As buyers spend more time in chat-based environments, the most agile businesses are revamping their approach to building and driving action.
Personalization that scales:Customers crave human connection and messaging platforms deliver it. With tools that pull in browsing behavior, purchase history, and real-time context, entrepreneurs and creators alike can now offer VIP-style service to every shopper. Think: automated coupon drops, back-in-stock alerts, or custom product recommendations – all within the chat thread.
This is the major shift automation enables: authentic presence at scale. For the first time, creators and entrepreneurs no longer have to choose between being responsive and being real. With AI, they can stay present in thousands of conversations without losing the tone, timing, or trust that made a brand reputable in the first place.
However, the power of this movement lies in the timing. Automations show up exactly when they’re needed. Whether that’s a discount sent at the moment of hesitation or a restock alert that feels like it was sent by a personal shopper. The result? Higher open rates, faster response times, and better conversion across the board.
Even solo creators are now delivering high-touch experiences that rival big brands. The difference is, it’s happening one-to-one and in real time, without a massive team.
Where there’s a DM, there’s a purchasing decisionWebsite analytics can tell that someone clicked. That they spent 42 seconds on the product page. Maybe they even added something to the cart. But that’s still guesswork. An entrepreneur is left interpreting behavior, hoping it means something. But a DM that says, “Hey, do you have this in stock?” That’s clear as day: a customer is getting ready to buy.
Conversations are becoming the new top-of-funnel. When a customer initiates a message, they’re sending a clear intent signal. One you can act on immediately. Share a size guide. Offer a promo. Drop a product link right into the thread. No forms, no delays.
To be clear: By no means does this replace the website. In fact, quite the opposite. DMs often serve as the warm introduction that makes the click-through more valuable. The result? Higher intent traffic, better conversion rates, and fewer missed opportunities.
Because when someone takes the time to message a brand, they’re making active purchasing decisions and creating opportunities to act on an intent signal in real-time: Offer a discount. Suggest the right size. Trigger a purchase link. That’s why more entrepreneurs are shifting from pageviews to conversations. And when entrepreneurs and creators have automation set up, they can act on those signals instantly.
The smartest businesses — and creators — aren’t waiting around for clicks or form fills. They’re meeting their audience where the conversation is already happening: in the DMs.
Because in today’s attention economy, speed matters. Relevance matters. And connection always matters. Together, they create real moments of engagement that build trust, strengthen relationships, and drive meaningful revenue, all without slowing down momentum.
We've featured the best ecommerce software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Countless software developers, likely including those within Fortune 500 companies, were victims of a supply chain attack after Nx, the open source build system and development toolkit, was compromised.
In an announcement posted on GitHub, Nx said, “malicious versions of Nx and some supporting plugins were published” on NPM.
At the same time, security researchers Wiz released a separate announcement, saying the malicious versions were carrying infostealing malware, grabbing secrets such as GitHub and NPM tokens, SSH keys, crypto wallet information, and more, from attacked developers.
Thousands of leaked tokensHow Nx was compromised remains unknown - Wiz believes the threat actors managed to get ahold of a token with publishing rights, which enabled them to push malicious versions to NPM, despite all maintainers having two-factor authentication (2FA) enabled at the time of the attack. Apparently, 2FA was not needed to publish the packages.
The attack lasted approximately four hours, before NPM removed all of the poisoned versions.
Nx did not discuss how many companies might have been struck in this supply chain attack, but Wiz told The Register via email that more than 1,000 valid GitHub tokens were leaked. Furthermore, the attackers stole around 20,000 files and “dozens” of valid cloud credentials and NPM tokens.
Affected users should reach out to Nx’s support team for help.
Both NPM and Nx are hugely popular in the software development community, with more than 70% of Fortune 500 companies are allegedly using it, so it’s perhaps not surprising it is under constant attack.
However, security researchers Step Security found something unique: the malware “weaponized AI CLI tools (including Claude, Gemini, and q) to aid in reconnaissance and data exfiltration - marking the first known case where attackers have turned developer AI assistants into tools for supply chain exploitation.”
"This technique forces the AI tools to recursively scan the file system and write discovered sensitive file paths to /tmp/inventory.txt, effectively using legitimate tools as accomplices in the attack."
You might also likeA new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: Quordle hints and answers for Thursday, August 28 (game #1312).
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1313) - hint #1 - VowelsHow many different vowels are in Quordle today?• The number of different vowels in Quordle today is 5*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1313) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 1.
Quordle today (game #1313) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?• No. None of Q, Z, X or J appear among today's Quordle answers.
Quordle today (game #1313) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 2.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1313) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?• F
• T
• F
• P
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1313) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle, game #1313, are…
I have never before experienced today’s phenomenon when an incorrect guess for one word turns out to be a correct guess for another.
This is what happened with FLAIR and FRAIL, which feature the same letters but in a different order. My wrong guess for FLAIR gave me the unusual sensation of annoyance at coming so close and simultaneous pleasure after realizing it didn’t matter.
Daily Sequence today (game #1313) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1313, are…
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Strands hints and answers for Thursday, August 28 (game #543).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #544) - hint #1 - today's themeWhat is the theme of today's NYT Strands?• Today's NYT Strands theme is… A long time in the making
NYT Strands today (game #544) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
• Spangram has 13 letters
NYT Strands today (game #544) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?First side: left, 6th row
Last side: right, 6th row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #544) - the answers(Image credit: New York Times)The answers to today's Strands, game #544, are…
The theme made me think about buildings and I thought I was on the right track when I got SPIRE straight away after beginning my search in the left-hand corner. Next, I got ARCH and was convinced we were looking for parts of buildings.
The spangram came after I thought I’d got two non-game words before putting them together and realizing I was on the wrong track. From here I hit a wall and struggled to find anything.
Two hints gave me MESA and BUTTE, which was very helpful as these are two types of formation that were unfamiliar to me. From here I was able to complete the board.
Yesterday's NYT Strands answers (Thursday, August 28, game #543)Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.
A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Connections hints and answers for Thursday, August 28 (game #809).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #810) - today's words(Image credit: New York Times)Today's NYT Connections words are…
What are some clues for today's NYT Connections groups?
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #810) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #810) - the answers(Image credit: New York Times)The answers to today's Connections, game #810, are…
I crashed out today after cobbling together the yellow group having already made a couple of errors.
Annoyingly, I was on the right track for three of the groups. I thought that SPLIT was the link but I had PERSONALITY and CHEVRON instead of 7-10 and STOCK. Not even getting one away tricked me into thinking I was off track.
Then, with just one mistake left, I had BALLOON, MUSHROOM, and MOUNT but had STOCK instead of WAX.
Being based in the UK I think I can be forgiven for missing PLACES THAT SELL GAS, but, regardless, this was a poor round for me.
Yesterday's NYT Connections answers (Thursday, August 28, game #809)NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
Resident Evil Requiem has a third-person mode for players who couldn't handle first-person in Resident Evil 7, according to game director Koshi Nakanishi.
In an interview with GamesRadar at Gamescom 2025, Nakanishi acknowledged that his previously directed game, Resident Evil 7, might have been too scary and decided to offer two options in the upcoming entry to allow for a more enjoyable experience.
"Looking back at Resident Evil 7's first person perspective, I implemented that as a way to make it more immersive and more scary than ever before, which I think most you know media and players agreed it was an incredibly scary game, but it was possibly too scary," Nakanishi said.
"I think some people couldn't handle it, and either couldn't finish or didn't even start it. And that's something that I look back on thinking that, you know, I want to make sure that people can enjoy this game."
Resident Evil Village introduced a third-person mode through downloadable content (DLC) post-launch, and like that game, Requiem will also allow the option to switch between first and third-person while playing, which Nakanishi hopes will make the jumpscares and horror more manageable.
"So if you started the game off in first person perspective, and you're finding it's too much, then third person is almost a way to step slightly back from that level of horror and make it slightly easier to deal with by having the character on screen as a kind of avatar of yourself," he explained.
Resident Evil Requiem is set to launch on February 27, 2026, for PlayStation 5, Xbox Series X, Xbox Series S, and PC.
You might also like...United States Secretary of Defense Pete Hegseth has ordered a review of the involvement of Chinese nationals in managing cloud services for the Pentagon and wider US military.
“For nearly a decade, Microsoft has used Chinese coders, remotely supervised by US contractors to support sensitive Department of Defense cloud systems - and if you’re thinking America First and common sense, this doesn’t pass either of those tests," Hesgeth said.
The declaration comes after a ProPublica report claimed Microsoft’s use of Chinese engineers to maintain Department of Defense computer systems with ‘minimal supervision by US personnel’ was ‘inherently risky’ - but Microsoft has said it will soon stop using these China based-engineers for US military tech support.
Digital escortsThese workers were supervised by ‘digital escorts’ - who were found to be mainly low-skilled and low-paid workers with very little coding experience.
One such escort told ProPublica; ‘we’re trusting that what they’re doing isn’t malicious, but we really can’t tell.’
“The use of Chinese nationals to service Department of Defense cloud environments, it’s over,” Hegseth went on. “We’re requiring a third-party audit of Microsoft’s digital escort program, including the code and the submissions by Chinese nationals.”
Not only that, but Hegseth will also require the Department of Defense to carry out a separate investigation of the digital escort program and the Chinese Microsoft employees involved.
“The program was designed to comply with contracting rules, but it exposed the department to unacceptable risk,” he argued.
“These investigations will help us determine the impact of this digital escort workaround. Did they put anything in the code that we don’t know about? We’re going to find out.”
Going forward, all software vendors for the DoD will also have to identify and terminate any Chinese involvement in DoD systems.
“It blows my mind that I’m even saying these things, that we allowed it to happen - that’s why we’re attacking it so hard,” Hegseth said.
You might also likeMicrosoft and Cloudflare have announced a new collaboration which seeks to make websites easier for both people and automated systems to query.
The initiative merges Microsoft’s “NLWeb” standard with Cloudflare’s “AutoRAG” infrastructure, providing a model for conversational search.
Instead of keyword-based navigation, the system allows natural language interaction, presenting direct answers rather than lists of links.
From search engines to answer enginesThe goal of the new launch is to make any site function like an AI app, where human visitors and AI agents can ask questions and receive structured responses.
“Together, NLWeb and AutoRAG let publishers go beyond search boxes, making conversational interfaces for websites simple to create and deploy,” said R.V. Guha, creator of NLWeb, CVP, and Technical Fellow at Microsoft. “This integration will enable every website to easily become AI-ready for both people and trusted agents.”
Traditional search relies on keywords, leaving users to sift through multiple links to reach relevant information, but advocates of this new approach argue the model no longer matches expectations shaped by tools such as ChatGPT, Copilot, and Claude.
These systems provide immediate answers, and people increasingly expect websites to do the same.
However, while that framing is compelling, it assumes that all users prefer conversational responses over browsing.
The partnership also emphasizes the role of AI agents as a new class of “visitors.”
These automated systems typically scrape pages or follow keyword queries, but NLWeb introduces a structured “MCP” endpoint that gives them controlled access to site data.
This could reduce the inefficiency of scraping while allowing website owners to define the terms of access.
Yet questions remain about whether site operators will see tangible benefits or primarily additional technical burdens.
Cloudflare’s AutoRAG component handles crawling, indexing, and embedding site content into a managed vector database.
The system promises to keep information fresh with continuous updates and provide observability through Cloudflare’s AI Gateway.
While this sounds efficient, it effectively places indexing and access pipelines in the hands of a third-party infrastructure provider.
That raises concerns about cost, dependency, and whether site owners will cede too much control over how their data is handled.
By framing websites as first-class data sources for AI tools, Microsoft and Cloudflare are positioning themselves in direct competition with traditional search engines, particularly Google.
If AI writer models and LLM systems increasingly rely on structured access rather than scraping, search traffic patterns could change significantly.
To enable conversational search on a website through Cloudflare’s AutoRAG, users log into the Cloudflare Dashboard, create a new AutoRAG instance using the NLWeb Website quick deploy option, select the desired domain, and start indexing.
Once the process is complete, the site’s content becomes searchable through natural language queries, and owners can preview or embed the conversational interface to test how it will appear to visitors.
You might also likeFor years, the shift away from passwords toward passkeys has been framed as the future of secure authentication.
By relying on cryptographic key pairs instead of weak or reused strings, passkeys promised to remove the risks that have long plagued password systems.
However at the recent DEF CON 33 event, SquareX researchers presented new findings which challenge this view, claiming the very browsers relied upon to manage passkey workflows can be exploited in ways that bypass their protections.
The mechanics of passkeysPasskeys operate through a system where a private key remains on a user’s device while a public key is stored by the service provider.
To log in, the user verifies identity locally with biometrics, a PIN, or a hardware token, and the server authenticates the response against its stored public key.
This structure should eliminate many of the classic risks, such as phishing or brute force attacks, yet the entire process assumes the browser serves as a trustworthy mediator, a role that SquareX researchers now argue is dangerously fragile.
They showed how attackers can manipulate the browser environment with malicious extensions or scripts, allowing them to intercept the registration flow, substitute keys, and even trick users into re-registering under attacker-controlled conditions.
From the victim’s perspective, the login process looks indistinguishable from a legitimate passkey operation, with no warning signs that credentials are being compromised.
Established enterprise security tools, whether endpoint protection or network defenses, do not provide visibility into this level of browser activity.
“Passkeys are a highly trusted form of authentication, so when users see a biometric prompt, they take that as a signal for security,” said SquareX researcher Shourya Pratap Singh.
“What they don’t know is that attackers can easily fake passkey registrations and authentication by intercepting the passkey workflow in the browser. This puts pretty much every enterprise and consumer application, including critical banking and data storage apps, at risk.”
With the majority of enterprise data now stored in SaaS platforms, passkeys are being rapidly adopted as the default authentication method.
SquareX’s findings suggest this transition introduces a new dependency on browser security, an area where oversight has traditionally been weak.
Passkeys may still represent progress beyond traditional credentials, yet the SquareX researcg shows no system is completely free from flaws, and organizations may have moved too quickly to embrace passkeys as a universal solution.
How to stay safeThe Gilded Age season 4 is nowhere near being released yet, but I already feel incredibly sorry for Bertha (Carrie Coon). Granted, she hasn't been my favorite person during the last three seasons of the hit HBO Max show, nor is she usually the most agreeable.
However, she's got the weight of the world on her shoulders after the shocking last moments in the season 3 finale.
Let's rewind for a second. In episode 7, Bertha's husband George (Morgan Spector) was left on death’s door after being shot by a 19th century hitman disguised as a courier. We learn in episode 8 that he (just about) pulls through, but later uses his brush with death to tell Bertha he doesn't love her.
Well, at least he's no longer sure if he does. While he mulls it over, George leaves for New York without so much as an amicable thought between them. Meanwhile, Gladys (Taissa Farmiga) has got hitched to the Duke of Buckingham, announcing her pregnancy in the season's final moments.
In short, this all means Bertha's living her dream life vicariously through her daughter, sans husband. The Gilded Age season 4 will surely be her redemption arc, but I think there are two other potential foes in her way that we've not even considered.
Agnes and Enid could both be coming for Bertha in The Gilded Age season 4Christine Baranski's Agnes could cause new trouble in The Gilded Age season 4. (Image credit: HBO)Instead of Bertha peacefully trying to assimilate into the British Royal family, she's potentially got two other fights on her hands: with longstanding rival Enid (Kelley Curran) and a new potential sparring partner in Agnes (Christine Baranski).
Let's start with Agnes first. By the time the season 3 finale rolled around, niece Marian (Louisa Jacobson) and Larry Russell (Harry Richardson) hadn't officially got their engagement back on track, though both have said they want to do so. This is a nightmare for Agnes because up until now, she's merely tolerated the new money that the Russell family represent.
If the marriage goes ahead, there's sure to be arguments galore as the two families try to blend into one. Bertha had Agnes' approval after winning the season 2 opera war against Mrs. Astor (Donna Murphy), but that tolerance can be taken away in an instance.
This is where Enid comes in. Agnes’ son, Oscar (Blake Ritson) has potential nuptials on the cards with Enid, the woman who was fired from being Bertha's maid by sexually propositioning George. Oops.
Once again, she's new money, and after Oscar was scammed out of all of the family's money (that came up again in the season 3 Haymarket double-cross), that's bad news. Larry and Marian marrying would make Enid essentially a part of the Russell family, so there are more issues to stoke the potential fire of feud.
We've currently got no idea if George is coming back for The Gilded Age season 4, but again, this could cause further problems. Bertha would have to welcome Enid back into the family if the nuptials go ahead, and that's set to open old wounds if George is still kicking around (and worse, if he decides he no longer wants to be with Bertha).
Is any of this what Bertha needs in The Gilded Age season 4? Absolutely not. Are the potential new rivalries going to make new episodes even juicier for us? You can count on it.
All three seasons of The Gilded Age are streaming on HBO Max in the US, NOW TV in the UK and Paramount+ in Australia.
You might also likeMicrosoft is warning users about a ransomware operator that is more interested in compromising cloud infrastructure than on-premise devices since it’s faster, more efficient, and more disruptive.
In a new report, the company highlighted Storm-0501, a financially motivated group observed to go primarily for hybrid cloud environments. The group would first compromise on-premise Active Directory domains via domain trust relationships, and then use Entra Connect Sync servers to pivot towards the cloud and into Microsoft Entra ID tenants.
From there, the group would exploit a non-human synced identity with Global Admin rights, and no multi-factor authentication (MFA) set up, to gain full cloud access which, in turn, allowed them to create a backdoor using malicious federated domains, and by abusing SAML tokens.
Weathering the stormCompromising Azure this way is an alarming turn of events, since crooks can gain owner role across subscriptions, map critical assets using AzureHound, exfiltrate data via AzCopy CLI, delete backups and storage using Azure operations and, in some instances, even encrypt the files using custom Azure Key Vault keys.
Attacking the cloud rather than on-prem infrastructure allows for faster data exfiltration, as well as the destruction of backups. Adding insult to injury, it also allows them to reach out to their victims via Microsoft Teams to and demand a ransom payment.
"Leveraging cloud-native capabilities, Storm-0501 rapidly exfiltrates large volumes of data, destroys data and backups within the victim environment, and demands ransom — all without relying on traditional malware deployment," Microsoft wrote.
To mitigate the threat, businesses should - before doing anything else - enforce MFA for all users, especially for privileged accounts. Then, they should restrict Directory Synchronization Account permissions, use TPM on Entra Connect Sync Servers, and apply Azure resource locks and immutability policies.
Finally, Microsoft advises enabling Defender for Endpoint and Defender for Cloud across all tenants, and naturally - monitoring with Azure activity logs and advanced hunting queries.
You might also likeSamsung is bringing Microsoft Copilot to its TVs and monitors this year "for smarter on-screen experiences". The news comes via Samsung's Dutch website and Microsoft's Generative AI blog, which says that the combination of Copilot and Bixby "creates a richer, more contextual smart display experience."
According to Samsung, the new Copilot integration will be accessible through the Tizen OS Home and Samsung Daily+. Copilot will provide "personalized recommendations, relevant information, and interactive learning experiences."
Copilot will respond to questions "instantly to share quick facts about actors or athletes, summarize plots, support foreign language learning, or help break down complex concepts – all from the biggest screen in the home."
What will Copilot on TV actually do?While Samsung's press release is pretty light on detail, Microsoft gives five specific scenarios for Copilot on TV. They are:
The Microsoft blog also shows a video of Copilot in action, its weird blobby face pulsing on the screen with its lips synched to its speech.
Copilot will be coming to some of the best Samsung TVs and monitors in "select markets", and we've put a call in to Samsung to find out which ones.
Microsoft says Copilot will be coming to 2025 models including "Micro RGB, Neo QLED, OLED, The Frame Pro, The Frame, as well as the M7, M8, and M9 Smart Monitors."
That list includes some of the best TVs of this year – though there's no word yet on whether this will come to older TVs as part of Samsung's commitment to seven years of software updates for its TVs.
You might also likeThese days it seems that every app is incorporating artificial intelligence (AI) in some way, and WhatsApp is rolling out a new AI feature that could help improve your messages and enable you to say exactly what you want to say.
Meta announced the new Writing Help feature in a blog post. It uses AI to suggest different ways you could phrase a drafted sentence, with options to simply proofread or rephrase the text, or to spruce it up in a more professional, humorous, or supportive manner.
Meta says this AI helper is built upon its Private Processing tech. This is a cloud service that encrypts your requests, meaning neither Meta nor WhatsApp can read them. Meta says it only uses data “that’s useful for processing the user’s request.” Once your query has been answered, it’s no longer stored on Meta’s servers. Meta doesn’t say whether your messages are used to train its AI, though.
How to use Writing Help(Image credit: Shutterstock)The feature isn't available everywhere yet, as Meta says it’s rolling it out starting in the US and “several other countries” with more coming “later this year”. It's also opt-in, so you'll need to enable it first. To do so, open WhatsApp, tap Settings > Chats > Private Processing, then enable the Private Processing feature – if you don't see this option then it's not available in your region yet.
To use Writing Help, you’ll first need to open a thread and draft a message in its text box. Once you’ve done that, you should see the sticker icon in the chat bar transform into a pencil. Tap this, then choose a writing option or style from the bottom of the app. If you’ve chosen to rephrase your text, you’ll see a range of different choices – tap one to have it replace your original draft text.
Note that you don’t have to just stick with whatever WhatsApp has suggested, as you can subsequently edit the new text and make further refinements before sending it.
If you do decide to enable Private Processing – and, with it, Writing Help – you might find it’s a useful way to get across the meaning of what you want to say when you can’t quite think of the right words. That might help prevent a rash of awkward conversations where your meaning is misunderstood or misinterpreted.
You might also likeNothing has found itself in a surprising situation, as demo units of the Nothing Phone 3 have been displaying stock photos – taken with professional cameras – and listing them as shot by the Phone 3 itself.
A photographer behind one of these images confirmed this to The Verge, but while you could easily jump to the conclusion that this was intentional deceit from Nothing, it seems more likely that it was an accident.
Speaking about the incident on X, Nothing co-founder Akis Evangelidis has said that this situation was an “unfortunate oversight” and that there was “no ill intent”.
Re the Phone (3) live demo units (LDU) in some stores using stock imagery - let me explain. An initial version of the LDU needs to be submitted with placeholders around 4 months before launch, to be implemented and tested as we ramp up towards mass production. Once we enter mass…August 27, 2025
They explained that an initial version of the Nothing Phone 3 demo units needed to be submitted with placeholder images around four months before launch, so that the demo units could be implemented and tested in time.
The intention was then to replace the placeholder images with photo samples once the Nothing Phone 3 entered mass production, but for whatever reason that step didn’t happen with some demo units.
Evangelidis additionally said that the company is “investigating internally to make sure such an issue doesn’t happen again.”
A capable cameraWe’re inclined to believe this explanation, not least because the Nothing Phone 3 seems perfectly capable of taking impressive photos.
While we haven’t put it through a full review yet, some samples posted on X certainly look eye-catching. So there should have been no real need to attempt deception, especially with the risk of getting caught.
So hopefully this situation won’t hamper impressions of what looks to be a very interesting phone, with a design unlike any other.
You might also likeSony has finally unveiled the prices and pre-order dates for its brand new Ghost of Yōtei PlayStation 5 hardware bundles.
Ahead of the launch of Sucker Punch's next game, Sony has announced that pre-orders for its Ghost of Yōtei Limited Edition PS5 Console bundles and accessories will be available for pre-order starting September 4 at 10 AM local time.
The latest hardware collection will be available in gold and black color variations and consist of limited edition PS5 consoles featuring Ghost of Yōtei's map of Ezo and matching DualSense Wireless controllers depicting a silhouette of Atsu on the touchpad. You can check out the details and prices below.
As explained in the latest PlayStation Blog post, the PS5 Console – Ghost of Yōtei Gold Limited Edition Bundle will be available globally and is inspired by the Japanese art form kintsugi, a traditional process to repair broken ceramics with lacquer and gold.
Meanwhile, the PS5 Console – Ghost of Yōtei Black Limited Edition Bundle will be exclusively available at PlayStation Direct and draws inspiration from the Japanese traditional art form, Sumi-e, which is the use of black ink on paintings.
Both bundles include a limited edition PS5 console with disc drive, a matching DualSense wireless controller, and a digital copy of Ghost of Yōtei Standard Edition that includes pre-order content, which includes a unique in-game mask for Atsu, and a set of seven PSN avatars featuring concept art of Atsu and each member of the Yōtei Six.
For those who already own a console, Console Covers for the PS5 Slim and PS5 Pro – Ghost of Yōtei Gold Limited Edition will also be available directly from PlayStation Direct and in limited quantities in other regions through select online retailers.
Both DualSense controllers will also be available as a standalone purchase.
Looking to get your hands on the new hardware?
Check out our guides on where to buy the Ghost of Yōtei consoles, as well as where to buy the PS5 Ghost of Yōtei DualSense controllers.
- Slated for release on Apple TV+ in 2026
- Adapted from William Gibson's 1984 cyberpunk novel
- Created for TV by Graham Roland and JD Dillard
- Comprised of 10 episodes
- No trailer yet, only a brief teaser announcing production start
The Neuromancer TV series is finally surging onto the small screen courtesy of those sci-fi loving folks at Apple TV+ and we're all amped!
Based on the Hugo and Nebula Award-winning sci-fi legend Willian Gibson's 1984 cyberpunk novel, Neuromancer, Apple TV+ is adding another jewel in its enviable crown of science fiction shows that includes Foundation, Silo, Invasion, Murderbot, Dark Matter, and For All Mankind.
Originally announced back in February of 2024 as an episodic series greenlit for pre-production development, Neuromancer is a seminal work of remarkable imagination that launched the sub-genre of cyberpunk and coined modern computer slang like "hacker" and “jacked in.” It’s been copied, imitated, and cannibalized over the decades as filmmakers tried in vain to adapt the novel for film or TV and rescue it from development hell.
Now it seems that Apple TV+ has found just the right formula and the show has entered full production as of this summer. So what's all the fuss about Neuromancer, what’s it about, and why does it remain one of the five most influential sci-fi books of the late 20th century? Let’s dodge the ICE, cowboy, and dissect this upcoming computer-driven dystopian series!
Is there a release date for Neuromancer?A post shared by Benedict Spence BSC (@benedict_spence_dop)
A photo posted by on
Apple TV+’s Neuromancer is expected to air sometime in late 2026. The show was officially announced to be in full production beginning on July 1, 2025, which was the 41st anniversary of the publication of Gibson's book. Filming is already underway in Tokyo, Los Angeles, Istanbul, Canada, and London and is expected to wrap around the end of the year if all goes well.
That sets up Neuromancer for a potential fall or winter release next year!
Are there any teasers or trailers for Neuromancer?At this time there's really only been one slightly cryptic teaser announcing the start of filming in July, which we must say is rather fitting for cult fans of the super-slick novel. In the video, a shadowy bar comes to life, with lights buzzing and pinball machines dinging as a blue-and-orange neon sign blinks awake spelling out Bar Chatsubo, the Chiba City lounge familiar to readers. It then announces that the series is now officially in production.
Who is cast in Apple TV+’s Neuromancer?Watch for Apple TV+'s Neuromancer series in 2026 (Image credit: Apple TV+)Neuromancer will be created for TV by Graham Roland (Tom Clancy’s Jack Ryan, Dark Winds) and JD Dillard (Devotion, The Outsider, Sleight). It’s a 10-episode co-production inked in a collaboration between Skydance Television and Anonymous Content that will also be produced by Drake's own production shingle, DreamCrew Entertainment, with Roland acting as showrunner and Dillard aboard to direct at least the pilot episode.
"We're incredibly excited to be bringing this iconic property to Apple TV+," creators and executive producers Roland and Dillard announced in a statement. "Since we became friends nearly 10 years ago, we've looked for something to team up on, so this collaboration marks a dream come true. Neuromancer has inspired so much of the science fiction that's come after it and we’re looking forward to bringing television audiences into Gibson’s definitive 'cyberpunk' world."
So far, the following actors have been reportedly cast in the Neuromancer series:
First off, be warned. Neuromancer is no casual beach read while sipping a White Claw and requires a certain level of concentration, memory, and ability to absorb rapid-fire, machine-gun waves of slang terms and hacker jargon. There’s a definite lack of satisfying explanations for some events, and the narrative demands your rapt attention. But the tone and pacing is totally exhilarating and takes your breath away if you can hang on!
Secondly, up until now nearly every film attempting to dip into this futuristic world of neon drenched streets, gleaming glass towers and digital tech conspiracies has not performed well at the box office. And that not only includes Ridley Scott’s Blade Runner, but also the James Cameron co-written Strange Days, and Johnny Mnemonic, which actually had its screenplay penned by William Gibson. It wasn’t until The Wachowskis helmed The Matrix in 1999 that folks got serious about cyberpunk again.
According to Apple TV+, the series will follow a burnt-out, psychologically damaged, elite super-hacker named Case who is reluctantly shoved into a tangled web of digital espionage and high stakes crime with his partner Molly after embezzling cash from a boss. She’s a cybernetically-enhanced "razor-girl" assassin with mirrored eyes dreaming of pulling off a daring heist on a dangerous corporate dynasty harboring secrets and she needs Case to join the gig.
Her client is Armitage, a clandestine former military agent with more than a few skeletons in his closet. Their target is a sophisticated AI called Wintermute, but things go sideways and the pair soon find themselves scrambling for their lives before they encounter its mysterious AI counterpart, Neuromancer. It’s set in a dark depressing world of corporate globalization and a data-frenzied society not unlike today.
You might also likeAvaya is reportedly offering voluntary exit packages to all employees as it becomes the latest tech firm looking to save money by reducing staffing costs.
The move is aimed at shedding “a lot of employees,” an unnamed source told CX Today, which was declined a comment by Avaya.
The news comes around a year after former Avaya CEO Alan Masarek announced his retirement, with Patrick Dennis stepping up as CEO very nearly a full year ago.
Avaya looks to shed “a lot of employees”Dennis set out a plan for Avaya to achieve “long-term” success when he took on the role, which coincided with the company’s second bankruptcy in five years (via CX Today).
Layoffs at the company started in North America, but by early 2025 they had spread globally. Countries in Europe and the Middle East have been left with minimal staff, with Avaya also shutting the doors on its offices and asking workers to work from home.
With the company emerging from its second bankruptcy and enacting repeated restructuring cycles, analysts are worried about Avaya’s long-term future.
Avaya has already conducted three major rounds of post-pandemic layoffs – two in the second half of 2024, and one at the beginning of 2023.
Its history also taints current performance, with the company having missed some early cloud trends like UCaaS. CX Today criticized Avaya for “missing early market signals, [having] weak execution and late timing,” leading to the rise of RingCentral, Verint and Zoom.
Zoom and RingCentral have undergone similar staffing changes in recent years, but they’ve managed to stay ahead of the market – Zoom in particular has reinvented itself as an AI-first productivity platform.
TechRadar Pro has contacted Avaya for comment.
You might also like