logo
Warm weather knocks Hollywood Bowl sales

Warm weather knocks Hollywood Bowl sales

But the group said it remained 'confident' on its outlook for the final six months of the year thanks to action to offset the weather knock and kept its full-year earnings guidance unchanged.
Stephen Burns, chief executive of Hollywood Bowl, said: 'The prolonged period of unprecedented dry and warm weather from March to May has had a short-term impact on trading.
'However, we've responded quickly, managing margins and costs while maintaining strong operational performance, which remains as good as it's ever been.
'Looking ahead, we're well positioned for the key summer holiday period.'
The group said drier weather earlier in the year – between February and late March – played a part in a fall in the number of bowling game bookings during its first half to March 31, down 4.5% in the UK on a like-for-like basis.
The fall was also driven by the timing of Easter and last year's leap year, which gave an extra day of trading, 'as well as the continuing competition from new competitive socialising offerings opening in certain locations', it said.
But it said spend per game rose, helping increase total UK like-for-like revenues by 1.3% in the half-year, with sales in bowling centres up 1.5%.
Pre-tax profits fell 9.4% to £28 million on an underlying basis in the six months to March 31 as costs also rose in the UK.
It saw its wage bill jump by £2.6 million to £24.9 million after minimum wage increases

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

May jobs report shows 139,000 jobs were added last month
May jobs report shows 139,000 jobs were added last month

The Herald Scotland

time13 hours ago

  • The Herald Scotland

May jobs report shows 139,000 jobs were added last month

Before the report's release, economists surveyed by Bloomberg estimated that 125,000 jobs were added last month. Job gains for March and April were revised down by a combined 95,000, portraying a weaker labor market that believed in late winter and early spring. March's total was downgraded from 185,000 to 120,000 and April's, from 177,000 to 147,000. Is the job market good or bad right now? The labor market has held up remarkably well despite the hurdles posed by Trump's economic policies, with employment gains averaging well over 100,000 a month so far this year. But many forecasters reckoned a more pronounced hiring slowdown took shape in May and would intensify in the months ahead. Trump's trade strategy lies at the center of the projected downshift. He paused the high double-digit tariffs he slapped on dozens of countries in April and in May agreed to slash levies on Chinese imports from 145% to a still-elevated 30%. China agreed to broadly similar concessions. But the moves hinge on further U.S. deals with China and other countries. And 25% tariffs remain in effect on all imported cars and many goods from Canada and Mexico. This week, Trump hiked fees on steel and aluminum imports to 50% from 25%. And while a trade court last month struck down many of Trump's tariffs, they remain in effect during an appeal, prolonging the uncertainty for businesses. Economists expect the duties to reignite inflation within a month or two and dampen consumer spending. The costs also have heightened business uncertainty, curtailing hiring and investment. How many federal employees are laid off? The Trump administration's Department of Government Efficiency has cut as many as 120,000 federal jobs but many workers have been placed on administrative leave, leaving them on U.S. payrolls pending court cases, Morgan Stanley said in a report. Still, the reductions have started to filter into the jobs numbers. Goldman Sachs estimates federal employment declined by a relatively modest 10,000 in May, adding to the 26,000 government workers that Capital Economics says already have been chopped since February. Are there still immigrants coming to America? Besides toughening enforcement at the southern border, the administration has canceled or declined to renew work permits and other protections for hundreds of thousands of migrants, economist Lydia Boussour of EY-Parthenon wrote in a note to clients. That will likely mean a smaller labor supply that further constrains hiring, especially in industries such as construction and hospitality, she said. Some calendar quirks also could have suppressed employment last month. For technical reasons, a late Easter likely boosted payrolls in April but heralds a lower tally for May as staffing levels returned to normal, Morgan Stanley said. Yet while hiring generally has slowed, other economists figured job growth remained sturdy last month as companies frustrated by labor shortages during the pandemic continued to curtail layoffs. Capital Economics and Barclays both predicted 150,000 jobs gains for May. By the end of the year, however, Barclays believes tariffs, federal layoffs and immigration curbs will slow average monthly job gains to about 75,000.

Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed

Scottish Sun

timea day ago

  • Scottish Sun

Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed

The blackmail message is believed to have included a racist term RANSOM DEMAND Terrifying message sent by 'Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) 'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. Sign up for Scottish Sun newsletter Sign up 2 High street retailer Marks & Spencer was hit by a cyber attack over the Easter holiday Credit: Alamy 2 M&S boss Stuart Machin, pictured, along with seven other company executives were emailed by the hackers, believed to be DragonForce Credit: PA The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. The £3.50 M&S buy that'll make your whole house smell like a 'boujee candle' Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations. A spokesperson for the company told The Sun Online: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'

Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed

The Sun

timea day ago

  • The Sun

Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed

'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. 2 2 The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store