logo
UK's Bytes Tech plunges 27% after profit warning

UK's Bytes Tech plunges 27% after profit warning

CNA6 days ago
(Corrects to say delayed customer decisions, not 'delayed customer payments', in paragraph 1)
Shares of UK's Bytes Technology plunged over 27 per cent on Wednesday after the IT firm said its operating profit for the first half of fiscal 2026 would be marginally lower due to delayed customer decisions and longer-than-expected readjustments from internal restructuring.
Trading in the first few months of the year was hurt by macroeconomic pressures, leading to deferred customer decisions, particularly among corporates, the firm said in an update to the exchanges ahead of its annual general meeting.
The stock fell as much as 27.43 per cent to 369 pence, the lowest since April 2023, before paring some losses to trade down 23 per cent at 391.4 pence by 08:00 GMT.
Bytes, which provides software, cloud, and AI services, is moving from a generalist sales model to specialised, customer segment-focused teams - a shift that has taken longer than expected, it said.
Also weighing on its performance in the first half are changes to Microsoft's enterprise agreement program, which the company had disclosed earlier, where certain transactional incentives have been reduced.
The impact of the changes are weighted more to the first half due to high levels of renewals in March and April, Bytes said.
The firm posted an operating profit of 35.6 million pounds ($48.8 million) for the first half of fiscal 2025. On Wednesday, it said it expects gross profit for the first half of fiscal 2026 to be flat.
In May, it had said it was "well positioned" to deliver another year of double-digit gross profit growth and high single-digit operating profit growth in financial year 2025-26.
"Investors will be slightly taken aback by the more cautious AGM statement, which now flags flat year over year trends versus May guidance for double-digit gross profit growth," Jefferies analysts said in a note.
($1 = 0.7298 pounds)
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

UK companies should have to disclose major cyberattacks, M&S says
UK companies should have to disclose major cyberattacks, M&S says

CNA

time7 hours ago

  • CNA

UK companies should have to disclose major cyberattacks, M&S says

LONDON :British businesses should be legally required to report material cyberattacks to the authorities, the chairman of retailer Marks & Spencer said on Tuesday, claiming two recent major attacks on large UK firms had gone unreported. Giving evidence to lawmakers on parliament's Business and Trade Committee on the April cyberattack which forced M&S to suspend online shopping for nearly seven weeks, Archie Norman said the group had learnt that "quite a large number" of serious cyberattacks never get reported to the National Cyber Security Centre (NCSC). "In fact we have reason to believe there've been two major cyberattacks on large British companies in the last four months which have gone unreported," he said. Norman said that meant there was "a big deficit" in knowledge in the cybersecurity space. "So I don't think it would be regulatory overkill to say if you have a material attack ... for companies of a certain size you are required within a time limit to report those to the NCSC." Norman declined to say if M&S had paid any ransom but said that subject was "fully shared" with the National Crime Agency and other authorities. He said "loosely aligned parties" worked together on the M&S cyberattack. "We believe in this case there was the instigator of the attack and then, believed to be DragonForce, who were a ransomware operation based, we believe, in Asia." A hacking collective known as Scattered Spider that deploys ransomware from DragonForce has previously been blamed in the media for the attack. "When this happens you don't know who the attacker is, and in fact they never send you a letter signed Scattered Spider, that doesn't happen," said Norman. He said M&S didn't hear from the threat actor for about a week after it initially penetrated its systems on April 17 through a "social engineering" operation. In May, M&S said the attack would cost it about 300 million pounds ($409 million) in lost operating profit. Norman said M&S was fortunate in having doubled its cyberattack insurance cover last year, though its claim could take 18 months to process. M&S resumed taking online orders for clothing lines on June 10 after a 46-day suspension but is yet to restore click and collect services. Last week, M&S CEO Stuart Machin told investors the group would be over the worst of the fallout from the attack by August. Nick Folland, M&S' General Counsel, told the lawmakers a major lesson from the crisis for businesses generally was to make sure they can operate with pen and paper.

M&S believes DragonForce behind ransomware attack, says chairman
M&S believes DragonForce behind ransomware attack, says chairman

CNA

time10 hours ago

  • CNA

M&S believes DragonForce behind ransomware attack, says chairman

LONDON :British retailer Marks & Spencer believes the ransomware operation behind the April cyberattack which forced it to suspend online shopping for nearly seven weeks was a group called "DragonForce", its chairman said on Tuesday. Archie Norman told lawmakers on parliament's Business and Trade Committee that "loosely aligned parties" worked together on the cyberattack. "We believe in this case there was the instigator of the attack and then, believed to be DragonForce, who were a ransomware operation based we believe in Asia." A hacking collective known as Scattered Spider that deploys ransomware from DragonForce, has previously been blamed in the media for the attack. "When this happens you don't know who the attacker is, and in fact they never send you a letter signed Scattered Spider, that doesn't happen," said Norman. He said M&S didn't hear from the threat actor for about a week after it penetrated the retailer's systems. As part of its management of the cyberattack, M&S stopped taking online clothing orders and also took other systems offline. That reduced food availability and also resulted in higher waste and logistics costs. In May, M&S said the attack would cost it about 300 million pounds ($409 million) in lost operating profit. The group resumed taking online orders for clothing lines on June 10 after a 46-day suspension but is yet to restore click and collect services.

Monzo fined $28 million by UK regulator for inadequate financial crime controls
Monzo fined $28 million by UK regulator for inadequate financial crime controls

CNA

time10 hours ago

  • CNA

Monzo fined $28 million by UK regulator for inadequate financial crime controls

LONDON :Britain's financial regulator has fined digital bank Monzo 21 million pounds ($28.57 million) for inadequate protection against financial crimes, which included taking on customers who had listed London landmarks as their address. As Monzo grew rapidly, it failed to maintain good enough controls to prevent the risk of financial crime, the Financial Conduct Authority (FCA) said in a statement on Tuesday. The regulator issued a fine of 21.1 million pounds for "inadequate anti-financial crime systems and controls" between October 2018 and August 2020. Monzo said the problems "have been resolved and are firmly in the past" and that it acted quickly to implement a programme to address financial crime issues in February 2021. Launched in 2015, Monzo is one of a handful of financial services apps, or "fintechs", to have emerged in Britain in the last decade, offering financial services via an app. After a 2020 review, the FCA imposed a requirement on Monzo to prevent it from opening new accounts for high-risk customers. But "between August 2020 and June 2022, it repeatedly failed to comply with the terms of the requirement, including signing up over 34,000 high-risk customers," the FCA said. Monzo said in a statement that the FCA's main findings relate to 2018 to 2020, and that the findings about 2020 to 2022 are "much narrower in scope". "Monzo onboarded customers on the basis of limited, and in some cases, obviously implausible information – such as customers using well known London landmarks as an address," Therese Chambers, FCA joint executive director of enforcement and market oversight, said. "This illustrates how lacking Monzo's financial crime controls were." "This was compounded by its inability to properly comply with the requirement not to onboard high-risk customers," Chambers added. Other fintechs in Britain have triggered regulatory concerns about their controls to stop financial crime. Starling Bank was fined 29 million pounds in 2024 after the FCA found its anti-money laundering controls and sanctions screening systems left the financial system "wide open to criminals". ($1 = 0.7349 pounds)

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store