Trio to suspend operations at McCool Ranch
California, May 23, 2025 (GLOBE NEWSWIRE) -- Trio Petroleum Corp (NYSE American: TPET) ('Trio' or the 'Company'), a California-based oil and gas company, has decided to suspend operations at McCool Ranch and will terminate its efforts to acquire a working interest in the project. We have made this determination, because, under previously negotiated terms, natural gas prices and water disposal costs, particularly in California, where McCool Ranch is located, makes it cost prohibitive for the Company to employ cyclic-steam operations to increase production and will not be economically feasible in the long run. The Company has decided to focus its efforts on other sites which it believes will be more economically feasible, and hopefully generate greater profits for the Company.
About Trio Petroleum Corp
Trio Petroleum Corp is an oil and gas exploration and development company in California, Saskatchewan and Utah.
Cautionary Statement Regarding Forward-Looking Statements
All statements in this press release of Trio Petroleum Corp ('Trio') and its representatives and partners that are not based on historical fact are "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995 and the provisions of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended (the 'Acts'). In particular, when used in the preceding discussion, the words "estimates," "believes," "hopes," "expects," "intends," 'on-track', "plans," "anticipates," or "may," and similar conditional expressions are intended to identify forward-looking statements within the meaning of the Acts and are subject to the safe harbor created by the Acts. Any statements made in this news release other than those of historical fact, about an action, event or development, are forward-looking statements. While management has based any forward-looking statements contained herein on its current expectations, the information on which such expectations were based may change. These forward-looking statements rely on a number of assumptions concerning future events and are subject to a number of risks, uncertainties, and other factors, many of which are outside of the Trio's control, that could cause actual results to materially and adversely differ from such statements. Such risks, uncertainties, and other factors include, but are not necessarily limited to, those set forth in the Risk Factors sections of the Trio reports filed with the Securities and Exchange Commission (SEC). Copies of such documents are available on the SEC's website, www.sec.gov. Trio undertakes no obligation to update these statements for revisions or changes after the date of this release, except as required by law.
Investor Relations Contact: Redwood Empire Financial Communications Michael Bayes (404) 809 4172 michael@redwoodefc.comSign in to access your portfolio
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
44 minutes ago
- Yahoo
AI is upending the job market, even at AI companies
AI's impact is affecting entry-level engineering roles. Anthropic CPO Mike Krieger said the company is focused on hiring more experienced employees instead. Anthropic's CEO, meanwhile, has warned that AI could eliminate 50% of entry-level jobs. Anthropic CPO Mike Krieger, who also cofounded Instagram, says the job market is going to be tough for new grads. Krieger told The New York Times' "Hard Fork" podcast on Friday that Anthropic is focused instead on hiring experienced engineers. He said he still has "some hesitancy" with entry-level workers. To some extent, that's a reflection of Anthropic's internal structure, which doesn't yet support a "really good internship program," Krieger said. Internships have long been the golden ticket to lucrative entry-level tech jobs. But it also shows how AI is upending the labor market, even at AI companies. As AI continues to evolve, Krieger said that the role of entry-level engineers is going to shift. On a recent episode of the 20VC podcast, Krieger said software engineers could see their job evolve in the next three years as coders outsource more of their work to AI. Humans will focus on "coming up with the right ideas, doing the right user interaction design, figuring out how to delegate work correctly, and then figuring out how to review things at scale — and that's probably some combination of maybe a comeback of some static analysis or maybe AI-driven analysis tools of what was actually produced." There is an exception, however. "If somebody was... extremely good at using Claude to do their work and map it out, of course, we would bring them on as well," Steve Mnich, a spokesperson for Anthropic, told Business Insider by email. Claude, Anthropic's flagship chatbot, has become known among users as a coding wizard with a manipulative streak. "So there is, I think, a continued role for people that have embraced these tools to make themselves, in many ways, as productive as a senior engineer." On its careers page, Anthropic is hiring for 200 roles across categories from AI research and engineering to communications and brand to software engineering infrastructure. BI reviewed the job descriptions for each of these roles and found that the majority require five or more years of experience, while a handful of jobs, particularly in sales, require between 1 and 2 years of experience. Anthropic CEO Dario Amodei has also warned about the threat AI poses to entry-level jobs, both inside and outside the AI industry. In an interview with Axios, Amodei said the technology could wipe out as much as 50% of entry-level jobs. "We, as the producers of this technology, have a duty and an obligation to be honest about what is coming," he told the outlet. "I don't think this is on people's radar." On Thursday, he told CNN that "AI is starting to get better than humans at almost all intellectual tasks, and we're going to collectively, as a society, grapple with it." David Hsu, the CEO of Retool, an AI application company with over 10,000 customers, including Boston Consulting Group, AWS, and Databricks, is also warning of changes on the horizon. He told BI that "workers have a lot of leverage over CEOs" in the current labor market. "I think CEOs are kind of tired of that. They're like, 'We need to get to the point where we can go replace labor with AI.'" Read the original article on Business Insider Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
an hour ago
- Yahoo
Luka Doncic Sends Austin Reaves Message After Lakers Trade Report
Luka Doncic Sends Austin Reaves Message After Lakers Trade Report originally appeared on Athlon Sports. The biggest storyline for the Los Angeles Lakers' 2024-25 season was the blockbuster midseason trade that brought Luka Doncic from the Dallas Mavericks in exchange for Anthony Davis. This move paired Doncic with LeBron James, creating a formidable duo to strengthen the Lakers' championship aspirations. Advertisement Following the trade, the Lakers experienced a surge in performance, finishing as the No. 3 seed in the Western Conference, with a 50-32 record. Doncic's integration into the team transformed the Lakers into a hopeful championship contender, but their run ended in the first round. While much focus was placed on the Doncic-James duo, these two stars had a high-level third option in Austin Reaves. Los Angeles Lakers teammates LeBron James (23) and Luka Doncic (77).Jason Parkhurst-Imagn Images Reaves averaged a career-high 20.2 points this past season, and has been a topic of discussion since LA was eliminated. While trade rumors have surrounding the rising star, especially as the Lakers seek an upgrade at center, Dan Woike of the LA Times reported last month that Reaves is not expected to be moved unless the Lakers get an "impossibly good offer" for him. Advertisement Just two weeks after this report, Doncic appearance on James' and Steve Nash's Mind the Game podcast. Among other things, Doncic specifically brought up Reaves, being sure to include him in a discussion about the growing chemistry between LA's best players. "I've never played with a guy like this," Doncic said of James before bringing up Reaves. "Just being traded to LA; it was different… [Us] two out there and [Austin Reaves], who's been playing unbelievable. I still think it's a work in progress." This message from Doncic adds more merit to the report from Woike that Reaves is not expected to be moved this offseason. Doncic highlighting Reaves as part of a "work in progress" trio that includes he and James certainly feels notable. Advertisement Statistically, Doncic maintained impressive numbers in LA, averaging 28.2 points, 8.1 rebounds and 7.5 assists per game since joining the Lakers. While there have also been rumors about James' and Doncic's future with the Lakers, LA's front office has maintained its commitment to building a roster that complements the duo. Related: Three-Time All-NBA Star Announces Decision on Retirement Related: NBA Legend Carmelo Anthony Reacts to Major Kiyan Anthony News This story was originally reported by Athlon Sports on Jun 2, 2025, where it first appeared.


Business of Fashion
an hour ago
- Business of Fashion
Explainer: How Retailers Can Fight a New Wave of Cyberattacks
Last week, Victoria's Secret went dark. On May 28, the lingerie giant shut down its website following a 'security incident,' the company said in a statement. (It did not confirm what caused the disruption). While the site was only down for two days, it likely cost Victoria's Secret millions in sales, adding another hurdle to its ongoing turnaround plan under new leader Hillary Super. The company's stock dropped as much as 8 percent the day it closed its site. It was just the latest technological dustup in a wave of cyberattacks on some of fashion's biggest brands and retailers. Bloomberg reported that in January hackers accessed some of Dior's customer data, then in April, UK-based high street retailer Marks & Spencer was forced to stop taking online orders after a security breach and in May, Harrods briefly restricted website access after hackers attempted to break into its systems. For years, the threat of security breaches — where individuals and organisations hack systems to access customer data such as contact information and credit card details — have haunted companies across industries, from Target to MGM Resorts. The frequency of these attacks is only growing: In 2024, the number of individuals and groups targeting companies' systems that cybersecurity consultancy S-RM engaged with across 600 incidents grew 96 percent year over year. These attacks can be extremely detrimental to a company's bottom line: Marks & Spencer still hasn't reopened its e-commerce operations, and doesn't expect to do so until July. The incident will likely end up costing the company as much as £300 million ($404 million) in lost profits. But the impact can be even further-reaching. Many cyber criminals require companies to pay multi-million dollar ransoms to regain access to their networks and even once the attack is over, retailers must work to avoid sustaining lasting reputational damage. The recent uptick in activity puts an extra burden on retailers to tighten existing cybersecurity processes or invest in additional tools that could chip away at profits. 'From a business perspective, it's nothing if not unfair [to the companies impacted by it],' said Simeon Siegel, managing director and senior analyst of retail and e-commerce at BMO Capital Markets. In the event of a cyber attack, companies have 'to balance short term fixes, while ensuring they don't have [long-term] implications,' he added. BoF breaks down what leaves fashion businesses vulnerable to cyberattacks and how they can protect themselves. How does this happen? Cyberattacks are typically orchestrated by groups that find and exploit a company's technological shortcomings. The culprit can often be difficult to trace, because even when law enforcement tracks them down, individuals can splinter into other smaller organisations. Criminals can also act individually by finding hacking tools on the dark web, said Christian Beckner, vice president of retail technology and cybersecurity at NRF. The tactics range in their level of sophistication. One of the common ways hackers infiltrate a company's systems is through 'phishing' — the dreaded emails where, posing as a company executive, they encourage employees to click a link that, if opened, can give them access to an organisation's entire data network. They can also use employee voice impersonation tools to target a company's customer service call centres, Beckner said. 'If one employee accidentally clicks a link in an email, it may not matter how protected and up-to-date your technology is,' Siegel said. 'Human error can supersede the most advanced technology.' Cyberattackers will target any industry with high transaction volumes, making fashion an appealing target. Plus, because most retail giants operate their e-commerce storefronts on years-old custom platforms that are likely outdated, they are particularly vulnerable, said Juan Pellerano-Rendón, chief marketing officer at e-commerce software start-up Swap. 'A lot of times these larger conglomerates have IT teams, and they're updating their website regularly, but security might not always be at the top of their list,' Pellerano-Rendón added. Retailers that operate with thin margins have historically been slower to invest in cybersecurity over tools like a website redesign that can immediately drive revenue, said Sam Rubin, senior vice president of consulting and threat intelligence for Unit 42 at cybersecurity firm Palo Alto Networks. 'You could spend several million dollars on cybersecurity and feel safer and be safer, but what's going to show up on your P&L is greater operating expenses without a necessarily highly visible tangible benefit,' Rubin said. 'Sometimes that does get neglected in favor of driving top line growth in business.' How should retailers respond? When a company is hacked, they often have no choice but to shut down services until they can find the culprit and boot them out of their network. Preventing an initial cyberattack can be a near impossible task as cyber criminals' tools become more advanced and accessible. Many retailers have increased cybersecurity measures in recent years, specifically around payment processing, Beckner said. Customers' financial information wasn't compromised in many of the recent attacks, which is the scariest violation for many customers and therefore a natural priority for companies to prevent. To lower the risk of repeat offenses, retailers have to 'assess where there might be existing vulnerabilities in your IT systems and services, and patch and upgrade those where they existed,' Beckner added, including adding multi-step authentications for company log-ins and conducting additional training for employees across the organisation. The latest run of cybersecurity hiccups could also push major retailers to make big personnel changes such as hiring heads of security (if they don't have them already), according to Pellerano-Rendón. They might also consider using more e-commerce services from software giants like Shopify that routinely update their software, making it more difficult to infiltrate, he added. Companies can institute drills where they work with third party firms to simulate an attack to better assess the strength of their existing systems and what additional processes they need to implement, said Steve Ross, director of cybersecurity, Americas at S-RM. In the aftermath of an attack, retailers also must do damage control in order to make sure their customers feel safe buying from them again. Shoppers today are aware that technology violations occur and are outside of a company's control, 'and not necessarily that Victoria's Secret or Marks & Spencer has betrayed their trust in any way,' Pellerano-Rendón said. Still, retailers need to tell customers whose personal information may have been compromised exactly which steps they've taken to protect their data down the line. 'It really comes down to making sure you're communicating … and having that plan in place to quickly bounce back,' Beckner said.