Humanoid Robots Play Soccer Tournament in China - 1

Photo by Wesley Tingey on Unsplash

Humanoid Robots Play Soccer Tournament in China

  • Written by Andrea Miliani Former Tech News Expert
  • Fact-Checked by Sarah Frazier Former Content Manager

Beijing hosted the inaugural RoBoLeague 3‑on‑3 humanoid robot soccer tournament this weekend. Four teams from different universities competed using humanoid robots from the Chinese company Booster Robotics.

In a rush? Here are the quick facts:

  • Beijing hosted the inaugural RoBoLeague 3-on-3 humanoid robot soccer tournament this weekend.
  • All AI-powered robots, prepared by four university teams, operated fully autonomously throughout the competition.
  • Booster Robotics supplied the T1 humanoid models used in the tournament.

According to Associated Press (AP) , the event was a success thanks to the entertainment provided by the fully autonomous, AI-powered machines. The match offered a preview of the upcoming World Humanoid Robot Games, set to take place during the World Robot Conference in August.

Although the robots did not demonstrate physical abilities or skills on par with high-performance athletes, the sporting event attracted new fans due to its use of cutting-edge technology. The competition sparked an enthusiasm that China’s official national soccer team—currently ranked 94th in FIFA’s world rankings—has not managed to generate recently.

Booster Robotics provided the machines, T1 humanoids, used for the competition. The company’s CEO and founder, Cheng Hao, shared his vision and expectations for the future of the technology in the sector.

“In the future, we may arrange for robots to play football with humans. That means we must ensure the robots are completely safe,” said Cheng to AP. “For example, a robot and a human could play a match where winning doesn’t matter, but real offensive and defensive interactions take place. That would help audiences build trust and understand that robots are safe.”

Tsinghua University’s THU Robotics won the tournament, with a score of 5-3, beating the China Agricultural University’s Mountain Sea team.

According to NBC News , each robot was equipped with multiple sensors that allowed them to identify the ball in the field, play, and stand up after falling—although a few of them needed human help, and others were taken off the field by human paramedics.

China has already held multiple sporting events featuring humanoid robots this year. In April, the first half marathon between robots and humans took place, and just a few weeks ago, the first kickboxing event between AI-powered machines using advanced technology was held.

GIFTEDCROOK Malware Evolves To Steal Sensitive Data - 2

Image by Nahel Abdul Hadi, from Unsplash

GIFTEDCROOK Malware Evolves To Steal Sensitive Data

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

The cyber group upgraded their spyware to steal data from Ukrainians, through fake military emails and Telegram messages.

In a rush? Here are the quick facts:

  • Hackers upgraded GIFTEDCROOK to steal sensitive files and browser data.
  • Malware spread using fake military-themed emails and documents.
  • Stolen data was sent to hackers via Telegram channels.

The hacking group UAC-0226 upgraded their GIFTEDCROOK spyware to evolve from basic web browser data theft into advanced software, capable of extracting sensitive computer files.

According to researchers at Arctic Wolf Labs , the group launched these upgraded attacks just as Ukraine and Russia were holding talks in Istanbul in June 2025.

‘‘This operation most likely focused on intelligence gathering through data exfiltration from compromised devices,” Arctic Wolf Labs reported, noting that the campaign ramped up just before the June 2 Istanbul negotiations on prisoner and body exchanges.

The hackers used fake emails made to look like military messages to trick people into opening infected files. These emails often claimed to include information about conscription or administrative fines. If a victim clicked the link or opened the file and followed the instructions, the spyware would secretly install itself and begin stealing files.

The updated versions of the malware allowed users to search for particular file types and recent documents, as well as browser cookies and passwords from Chrome, Edge, and Firefox. Arctic Wolf Labs explains that the hackers transmitted all stolen data through Telegram channels.

One fake document pretended to be a list of people being drafted into the military. It asked readers to enable macros, a common trick used by hackers to launch malware. Researchers also found that the email system used by UAC-0226 is shared with other hacker groups targeting Ukraine, suggesting a wider campaign.

The experts predict that the malware will continue to evolve through time. Organizations need to teach their employees about phishing email identification and secure tool usage, and stay alert as cyberattacks become more advanced and more closely linked to real-world events.