Blog

  • Aston Martin unveils new configurator that sets the standard for automotive digital products

    Aston Martin unveils new configurator that sets the standard for automotive digital products

    • Aston Martin announces a comprehensive update to its online configurator
    • Lustrous paint finishes and new environments provide the perfect showcase for Aston Martin’s ultra-luxury design
    • New graphics and navigation bring Aston Martin’s product range to life

     

    16 October 2025, Gaydon: Aston Martin launches the most comprehensive update of its online Configurator since it was originally launched four years ago. This essential component of modern car buying is a true gateway to the brand, and the refresh refines and elevates aspects of the user experience to create a truly premium digital presence.

     

    At the heart of the new configurator is an enhanced user experience, richer image quality and a more immersive feel overall. These changes are based on extensive user research and testing that has been undertaken to guide the configurator towards its new iteration. From the moment the configurator is opened, it presents a cohesive overview of the Aston Martin product range. Users then select the image of the model they want to start the configuration process. Once selected, the accompanying vehicle statistics are now more prominent, located directly below the cars themselves.

     

    The new configurator also uprates the graphical quality of the rendered images, with paint finishes appearing more lustrous and reflective, thanks to new animated previews that showcase colours responding to lighting finishes.  Paint thumbnail designs have also been enlarged, with a new graphic that emphasises the three-dimensional qualities of the paint as it moves across the surface of the bodywork.

     

    In addition to the existing rendered backgrounds, a new Gaydon environment has been created to help showcase the customer’s finalised specification. The stunning atrium entrance hall of Aston Martin’s Warwickshire HQ has played host to Aston Martins of every generation, from road and race cars to concepts and classics.

     

    On desktop systems, the navigation bar has also been moved from vertical to horizontal, allowing more space for the image of the vehicle. This sidebar can also be expanded or collapsed for a clearer view. As the customer makes their choices, key options are presented via a more accurate and relevant zoomed in view to highlight the difference between the various product selections.

     

    The newly enhanced configurator streamlines an essential part of the customer journey, with a fresh design language and graphical depictions. It will provide a showcase for the marque’s newest models, including the Aston Martin Vanquish Volante, Aston Martin DBX S, and the forthcoming Aston Martin Valhalla. In addition, paint colours like Apex Grey and Podium Green, are rendered in vivid, crisp detail, as are material surfaces like carbon fibre and titanium.

     

    ‘Our Configurator is an integral part of the modern Aston Martin customer experience,’ says Alex Long, Aston Martin’s Global Marketing Director. Our digital team has worked closely with Aston Martin’s design studio to shape an experience that is vivid, responsive, and inspirational. It’s essential to us that the quality and richness of Aston Martin’s design, engineering and craftsmanship is faithfully rendered to potential customers.’

     

    -ENDS-

    Continue Reading

  • Dead Space Creator Glen Schofield Thinks the Games Industry is “Broken, Beaten, and Battered”

    Dead Space Creator Glen Schofield Thinks the Games Industry is “Broken, Beaten, and Battered”

    In an impassioned end to his keynote address on the opening day of Gamescom Asia x Thailand Game Show in Bangkok, Dead Space creator and industry veteran Glen Schofield has declared that the games industry is in dire need of fixing, and he…

    Continue Reading

  • Toddler in western Cambodia becomes 16th victim of bird flu in 2025-Xinhua

    PHNOM PENH, Oct. 17 (Xinhua) — A three-year-old girl from western Cambodia’s Kampong Speu province has been confirmed for H5N1 human avian influenza, raising the number of cases to 16 so far this year, the Ministry of Health said in a…

    Continue Reading

  • Toddler in western Cambodia becomes 16th victim of bird flu in 2025-Xinhua

    PHNOM PENH, Oct. 17 (Xinhua) — A three-year-old girl from western Cambodia’s Kampong Speu province has been confirmed for H5N1 human avian influenza, raising the number of cases to 16 so far this year, the Ministry of Health said in a…

    Continue Reading

  • Artificial intelligence guides personalized treatment for heart patients

    Artificial intelligence guides personalized treatment for heart patients

    A landmark international study led by the University of Zurich has shown that artificial intelligence can assess patient risk for the most common type of heart attack more accurately than existing methods. This could enable doctors…

    Continue Reading

  • Cancer hijacks embryonic gene editors to fuel growth

    Cancer hijacks embryonic gene editors to fuel growth

    Cancer cells are known to reawaken embryonic genes to grow. A new study reveals the disease also hijacks the proteins, or “editors”, that control how those genes are read.

    The findings, published today in the journal Nucleic Acids…

    Continue Reading

  • Ledecky was my Goliath, says retiring Titmus – Reuters

    1. Ledecky was my Goliath, says retiring Titmus  Reuters
    2. Australia’s ‘Terminator’ Titmus makes shock retirement call from swimming  Dawn
    3. Ariarne Titmus: Australian swim star and four-time Olympic gold medallist retires aged 25  BBC
    4. ‘Bloody…

    Continue Reading

  • Ripple Labs Said to Lead $1 Billion Fundraise for XRP Hoard – Bloomberg.com

    1. Ripple Labs Said to Lead $1 Billion Fundraise for XRP Hoard  Bloomberg.com
    2. ChatGPT’s XRP Analysis: $2.38 Crashes 17% as Ripple Acquires GTreasury for $1B – Will $2.20 Hold?  TradingView
    3. Ripple announces $1 billion acquisition of financial management system company GTreasury  Bitget
    4. Ripple Pays $1 Billion for GTreasury to Enter Corporate Treasury  Bloomberg.com
    5. Ripple to buy private equity-backed GTreasury for $1B  Axios

    Continue Reading

  • Ganoderma lucidum protects against liver damage from high-fat diets

    Ganoderma lucidum protects against liver damage from high-fat diets

    Background and objectives

    A long-term high-fat diet (HFD) exerts lipotoxic effects on multiple organs, particularly the liver, leading to metabolic diseases. This study aimed to delineate the dynamic effects of HFD on lipid…

    Continue Reading

  • Extortion and ransomware drive over half of cyberattacks  

    Extortion and ransomware drive over half of cyberattacks  

    By Amy Hogan-Burney, Corporate Vice President, Customer Security & Trust  

    In 80% of the cyber incidents Microsoft’s security teams investigated last year, attackers sought to steal data—a trend driven more by financial gain than intelligence gathering. According to the latest Microsoft Digital Défense Report, written with our Chief Information Security Officer Igor Tsyganskiy, over half of cyberattacks with known motives were driven by extortion or ransomware. That’s at least 52% of incidents fuelled by financial gain, while attacks focused solely on espionage made up just 4%. Nation-state threats remain a serious and persistent threat, but most of the immediate attacks organizations face today come from opportunistic criminals looking to make a profit.
     
    Every day, Microsoft processes more than 100 trillion signals, blocks approximately 4.5 million new malware attempts, analyses 38 million identity risk detections, and screens 5 billion emails for malware and phishing. Advances in automation and readily available off-the-shelf tools have enabled cybercriminals—even those with limited technical expertise—to expand their operations significantly. The use of AI has further added to this trend with cybercriminals accelerating malware development and creating more realistic synthetic content, enhancing the efficiency of activities such as phishing and ransomware attacks. As a result, opportunistic malicious actors now target everyone—big or small—making cybercrime a universal, ever-present threat that spills into our daily lives.
     
    In this environment, organizational leaders must treat cybersecurity as a core strategic priority—not just an IT issue—and build resilience into their technology and operations from the ground up. In our sixth annual Microsoft Digital Defence Report, which covers trends from July 2024 through June 2025, we highlight that legacy security measures are no longer enough; we need modern defences leveraging AI and strong collaboration across industries and governments to keep pace with the threat. For individuals, simple steps like using strong security tools—especially phishing-resistant multifactor authentication (MFA)—makes a big difference, as MFA can block over 99% of identity-based attacks. Below are some of the key findings.
     
     

     
    Critical services are prime targets with a real-world impact.
     
    Malicious actors remain focused on attacking critical public services—targets that, when compromised, can have a direct and immediate impact on people’s lives. Hospitals and local governments, for example, are all targets because they store sensitive data or have tight cybersecurity budgets with limited incident response capabilities, often resulting in outdated software. In the past year, cyberattacks on these sectors had real-world consequences, including delayed emergency medical care, disrupted emergency services, cancelled school classes, and halted transportation systems.
     
    Ransomware actors in particular focus on these critical sectors because of the targets’ limited options. For example, a hospital must quickly resolve its encrypted systems, or patients could die, potentially leaving no other recourse but to pay. Additionally, governments, hospitals, and research institutions store sensitive data that criminals can steal and monetize through illicit marketplaces on the dark web, fuelling downstream criminal activity. Government and industry can collaborate to strengthen cybersecurity in these sectors—particularly for the most vulnerable. These efforts are critical to protecting communities and ensuring continuity of care, education, and emergency response.
     
    Nation-state actors are expanding operations.
     
    While cybercriminals are the biggest cyber threat by volume, nation-state actors still target key industries and regions, expanding their focus on espionage and, in some cases, on financial gain. Geopolitical objectives continue to drive a surge in state-sponsored cyber activity, with a notable expansion in targeting communications, research, and academia.
     
    A screen shot of a graph

AI-generated content may be incorrect.
     
    Key insights:

    • China is continuing its broad push across industries to conduct espionage and steal sensitive data. State-affiliated actors are increasingly attacking non-governmental organizations (NGOs) to expand their insights and are using covert networks and vulnerable internet-facing devices to gain entry and avoid detection. They have also become faster at operationalizing newly disclosed vulnerabilities.
    • Iran is going after a wider range of targets than ever before, from the Middle East to North America, as part of broadening espionage operations. Recently, three Iranian state-affiliated actors attacked shipping and logistics firms in Europe and the Persian Gulf to gain ongoing access to sensitive commercial data, raising the possibility that Iran may be pre-positioning to have the ability to interfere with commercial shipping operations.
    • Russia, while still focused on the war in Ukraine, has expanded its targets. For example, Microsoft has observed Russian state-affiliated actors targeting small businesses in countries supporting Ukraine. In fact, outside of Ukraine, the top ten countries most affected by Russian cyber activity all belong to the North Atlantic Treaty Organization (NATO)—a 25% increase compared to last year. Russian actors may view these smaller companies as possibly less resource-intensive pivot points they can use to access larger organizations. These actors are also increasingly leveraging the cybercriminal ecosystem for their attacks.
    • North Korea remains focused on revenue generation and espionage. In a trend that has gained significant attention, thousands of state-affiliated North Korean remote IT workers have applied for jobs with companies around the world, sending their salaries back to the government as remittances. When discovered, some of these workers have turned to extortion as another approach to bringing in money for the regime.

    The cyber threats posed by nation-states are becoming more expansive and unpredictable. In addition, the shift by at least some nation-state actors to further leveraging the cybercriminal ecosystem will make attribution even more complicated. This underscores the need for organizations to stay abreast of the threats to their industries and work with both industry peers and governments to confront the threats posed by nation-state actors.
     
    2025 saw an escalation in the use of AI by both attackers and defenders.
     
    Over the past year, both attackers and defenders harnessed the power of generative AI. Threat actors are using AI to boost their attacks by automating phishing, scaling social engineering, creating synthetic media, finding vulnerabilities faster, and creating malware that can adapt itself. Nation-state actors, too, have continued to incorporate AI into their cyber influence operations. This activity has picked up in the past six months as actors use the technology to make their efforts more advanced, scalable, and targeted.
     
    A graph on a blue background

AI-generated content may be incorrect.
     
    For defenders, AI is also proving to be a valuable tool. Microsoft, for example, uses AI to spot threats, close detection gaps, catch phishing attempts, and protect vulnerable users. As both the risks and opportunities of AI rapidly evolve, organizations must prioritize securing their AI tools and training their teams. Everyone—from industry to government—must be proactive to keep pace with increasingly sophisticated attackers and to ensure that defenders keep ahead of adversaries.
     
    Adversaries aren’t breaking in; they’re signing in.
     
    Amid the growing sophistication of cyber threats, one statistic stands out: more than 97% of identity attacks are password attacks. In the first half of 2025 alone, identity-based attacks surged by 32%. That means the vast majority of malicious sign-in attempts an organization might receive are via large-scale password guessing attempts. Attackers get usernames and passwords (“credentials”) for these bulk attacks largely from credential leaks.
     
    However, credential leaks aren’t the only place where attackers can obtain credentials. This year, we saw a surge in the use of infostealer malware by cybercriminals. Infostealers can secretly gather credentials and information about your online accounts, like browser session tokens, at scale. Cybercriminals can then buy this stolen information on cybercrime forums, making it easy for anyone to access accounts for purposes such as the delivery of ransomware.
     
    Luckily, the solution to identity compromise is simple. The implementation of phishing-resistant multifactor authentication (MFA) can stop over 99% of this type of attack even if the attacker has the correct username and password combination. To target the malicious supply chain, Microsoft’s Digital Crimes Unit (DCU) is fighting back against the cybercriminal use of infostealers. In May, the DCU disrupted the most popular infostealer—–Lumma Stealer—alongside the US Department of Justice and Europol.
     
    Moving forward: Cybersecurity is a shared defensive priority.
     
    As threat actors grow more sophisticated, persistent, and opportunistic, organizations must stay vigilant, continually updating their defenses and sharing intelligence. Microsoft remains committed to doing its part to strengthen our products and services via our Secure Future Initiative. We also continue to collaborate with others to track threats, alert targeted customers, and share insights with the broader public when appropriate.
     
    However, security is not only a technical challenge but a governance imperative. Defensive measures alone are not enough to deter nation-state adversaries. Governments must build frameworks that signal credible and proportionate consequences for malicious activity that violates international rules. Encouragingly, governments are increasingly attributing cyberattacks to foreign actors and imposing consequences such as indictments and sanctions. This growing transparency and accountability are important steps toward building collective deterrence. As digital transformation accelerates—amplified by the rise of AI—cyber threats pose risks to economic stability, governance, and personal safety. Addressing these challenges requires not only technical innovation but coordinated societal action.

    Continue Reading