Could next week’s Meta Quest Gaming showcase also include an announcement for an Oculus Quest 2 Pro?
That could be the case as tech analyst Ming-Chi Kuo (via PCGamesN ) predicts that Meta will soon refresh its VR headset with improved screen resolution and new mini LED displays. This newly upgraded Quest headset is slated to drop in “2H22” (the second half of 2022) according to Kuo.
Meta has already announced that its premium Project Cambria VR headset will drop this year, however, Kuo’s use of “Oculus Quest” suggests the company will also unveil a new member in its existing budget-friendly line.
This Quest Pro headset will reportedly include two new 2.48-inch mini LED displays with a resolution of 2160 x 2160 pixels per eye (a substantial upgrade from the dual 1832 x 1920 pixel LCD displays the Quest 2 currently uses).
The new headset will also be swapping out its 1P fresnel lenses for a slimmer 2P pancake design.
Kuo doesn’t allude to any other changes coming to the headset – however, these smaller upgrades suggest we might be looking at an Oculus Quest 2 Pro rather than a full-on Oculus Quest 3 .
Analysis: the Quest 2 Pro just makes sense
A new budget headset makes a lot sense for Meta in 2022. While Meta has plans to launch the Project Cambria device this year, it’s already warned people that this will be an expensive headset that more casual VR fans might want to avoid.
With Sony set to launch the PSVR 2 headset this year – which will likely be aimed at more budget-conscious players – Meta runs the risk of losing ground in the market as people wanting to try the latest VR tech (but not wanting to pay an arm and a leg) turn to Sony.
An Oculus Quest 2 Pro, with upgraded specs but at a more affordable price point than Cambria, could alleviate some of these pressures. Combined with Meta’s existing dominance in the space (with some of the best VR games out there), the company could comfortably stave off the Sony VR threat if it plays its cards right.

A new headset launch would also help cement the Meta name change.
Most people still call their headset the Oculus Quest 2, but officially it’s now the Meta Quest 2. The new name has yet to stick, and that likely comes from the device originally launching under the Oculus title, and people being more familiar with that branding as a result.
With Meta seemingly dedicated to its new name, launching a Meta Quest device (that’s completely free of Oculus) could help 'Meta Quest' stick better in people’s minds.
Plus, given the issues Apple has reportedly had with its own Apple headset , it's possible Meta’s next all-in-one device development is facing problems, too. Balancing affordability, weight, and functionality is a difficult act, and so while an Oculus Quest 3 seemed likely for 2023 it could have been delayed if Meta has too many kinks to iron out.
Meta can instead launch a device with more simple, minor improvements (like this Quest 2 Pro seems set to get) to bridge the gap. Meanwhile, its R&D team gets a bit more time to work out how to create a headset worthy of the Oculus Quest 3 title.
With the Meta Quest Gaming showcase set to drop on Wednesday, April 20 at 10am PST (6pm BST, April 20 / 4am AEST on April 21) we don’t have long to wait if a new headset is indeed on the way. Whatever is announced, though, you can be sure we’ll be here to bring you everything you need to know.
Dying Light 1 just got better on Xbox Series X
Dying Light 1's next-gen upgrade is available now on Xbox Series X, Xbox Series S and Xbox One.
This free upgrade adds two new video modes to Dying Light on Xbox One X and Xbox Series S and three new video modes on Xbox Series X, having already rolled out to PS5 players in early March.
Those on Xbox One X and Series S will have access to the new Performance mode (30fps in full HD) and Quality mode (targetting 30fps in QHD resolution ), with developer Techland also aiming to tackle EOS issues with new networking.
Those who upgrade Dying Light to the Xbox Series X version will see the survival horror utilizing the power of Microsoft's latest console, with a Performance mode (60fps in full HD), Balanced mode (targeting 60fps in QHD) and Quality mode (30fps in 4K) now available.
This upgrade is available for free for anyone who already owns Dying Light on Xbox and an applicable console.
Opinion: still worth playing

If you haven't played the original Dying Light yet, then it's absolutely worth doing so - especially if you've been eyeing up Dying Light 2 .
Though Dying Light is now seven years old, having released in 2015, it still holds up. Sure, it's a bit rough around the edges, but the recent next-gen upgrades will likely smooth that out and ultimately it's still one of the best survival horrors around - in my humble opinion. The world might not be as big as that of Dying Light 2's but, thanks to lots of DLC, there is plenty to keep you zombie-slaying for hours on end.
Not played Dying Light yet? Check out the best prices for the game in your region, below:
Everything we know about Lapsus$ and Okta so far
It has been a busy week for hacking and extortion collective Lapsus$. It first leaked what it claimed to be employee account information from LG Electronics , as well as source code for a variety of Microsoft products.
A few hours later, the group also released screenshots indicating it had breached identity and access management company Okta . News of the potential breach spread quickly online.
Okta provides a single sign-on service for large organizations that allows employees to log in to multiple systems without requiring a different password for each one. An Okta hack could have potentially severe implications for customers.
Okta's response
Okta published a preliminary statement on Tuesday morning, indicating that the screenshots Lapsus$ released came from "an attempt to compromise the account of a third party customer support engineer working for one of our subprocessors" that occurred in January this year.
A second statement from David Bradley, Chief Security Officer at Okta, provided more details about the "unsuccessful attempt" to breach the support engineer's account.
While reassuring customers that "the Okta service has not been breached and remains fully operational", he also admitted that a forensic investigation found "there was a five-day window of time between January 16-21, 2022, where an attacker had access to a support engineer's laptop". Bradley insisted, however, that "[t]he potential impact to Okta customers is limited to the access that support engineers have", noting in particular that the hacking group cannot download customer data and does not have access to passwords.
Independent security researcher Bill Demirkapi provided further details to TechRadar Pro via email. He explained that the third-party support engineer appeared to work for SYKES Enterprises, Inc, now confirmed by Okta, and that, "using the access this support staff had, Lapsus$ was able to breach Okta's internal Slack, Jira, and backend administrative access panel used to assist customers". He added that, "at this time, it does not appear like Lapsus$ still has access to Okta's environment."
On Tuesday afternoon, Lapsus$ responded to Bradley’s statement in its Telegram channel, taking issue with his characterization of the attack as “unsuccessful". Lapsus$ also claimed that Okta had been storing AWS keys in Slack and called the company out for waiting so long to notify their users about the January incident.

Bradley has since acknowledged that "a small percentage of customers - approximately 2.5% [366 companies] - have potentially been impacted" by the incident and may have had their data "viewed or acted upon", though he continues to insist “there are no corrective actions our customers need to take".
In a separate post , Bradley laid out a timeline for the incident and addressed Lapsus$'s earlier reference to a "superuser" portal, shutting down claims that this gave the group "god-like access" to customer accounts. Instead, Bradley clarified that the superuser portal “is an application built with least privilege in mind to ensure that support engineers are granted only the specific access they require to perform their roles".
Okta has faced criticism, both from Lapsus$ and the security industry, for not disclosing the January incident sooner. Unsurprisingly, the breach has made investors nervous, leading to a drop in Okta's stock price, as well as a downgrade from Raymond James Equity Research.
Who is Lapsus$?
Despite the chaos its members caused this week, Lapsus$ is relatively new to the cybercrime scene. The hacking collective first emerged at the end of last year , but has already breached big names, including Microsoft , Nvidia , Samsung and Ubisoft .
On Tuesday, Microsoft published a report about Lapsus$, noting the group is unconventional, because it broadcasts its activities on social media and openly recruits employees willing to give them access to companies they want to hack.
While gaining the group online fans, Lapsus$’s social media presence also works to its detriment. Lapsus$ made the attack on Microsoft known on social media while it was taking place , which Microsoft said "escalated our action allowing our team to intervene and interrupt the actor mid-operation, limiting broader impact".
Bloomberg reported on Wednesday that two of Lapsus$’s members are thought to be teenagers, one living near Oxford in the UK and one in Brazil. The British teenager, known by the aliases "White" and "Breachbase", was identified by cybersecurity researchers as early as mid-2021 after leaving a trail of information about himself online. He was also doxxed by other hackers, who claim he has nearly $14 million in cryptocurrency.
On Thursday, the BBC reported that seven people between the ages of 16 and 21 had been arrested by London police as part of an investigation related to Lapsus$, though it’s not clear whether the teenagers mentioned by Bloomberg were among those arrested. The seven have since been released under investigation.

On Tuesday night, Lapsus$ announced that the group “might be quiet” for a while, since some of their members were going on “vacation until 30/3/2022". While the group promised to "try to leak stuff ASAP", in light of the recent arrests, the collective may be taking a longer break than intended.
Despite their youthfulness, the teen members of Lapsus$ are extremely knowledgeable. As Microsoft noted , Lapsus$ "understands the interconnected nature of identities and trust relationships in modern technology ecosystems and targets telecommunications, technology, IT services and support companies to leverage their access from one organization to access the partner or supplier organizations".
How companies can protect themselves
Microsoft’s report contained advice for companies about how to protect themselves against attacks from Lapsus$. The report noted that "multifactor authentication (MFA) is one of the primary lines of defense against" the hacking collective. But it also emphasized that insecure methods, such as SMS-based MFA, are not enough, since Lapsus$ has engaged in SIM-swapping attacks to gain access to SMS MFA codes.
As Lapsus$ often steals credentials via social engineering, Microsoft also recommended increasing employee awareness about these kinds of attacks. Other suggestions included making use of "modern authentication options" for VPNs , and ensuring incident response communication channels are "closely monitored for unauthorized attendees" in case Lapsus$ tries to sneak in.
In addition, Microsoft provided a collection of resources companies can use to help with "detecting, hunting, and responding to" attacks from Lapsus$ or groups mimicking the same methods.