
The bargain £4 bus tickets for travel to 80 destinations around the UK
Looking to get the wheels rolling on a UK staycation? A coach company has tickets to travel across the country for just £4 this Easter.
FlixBus is offering passengers a promotional bus price to celebrate its fourth anniversary, with £4 tickets up for grabs from now until next Tuesday (22 April).
The travel provider has a network of over 80 destinations, including London, Birmingham, Leeds, Manchester, Liverpool, Hull, Bristol and Cardiff, for travellers to explore.
From 17 April, brand new locations such as Cheltenham, Gloucester, Swindon and Norwich will be available to book with FlixBus as the operator expands across the UK.
The less-than-a-fiver tickets are also on offer for travel on new routes to Bath, Chippenham, Newquay, Weston-super-Mare, Bournemouth, Southampton and Poole, which launch in mid-May.
FlixBus said it will also boost service frequency between cities as its network expands, with over 200 green buses on the road in England, Scotland and Wales by summer.
Andreas Schorling, senior managing director of FlixBus UK, said: 'Travel is fun and should be for everyone. FlixBus is making it so easy to enjoy trips across the country to see loved ones and explore new places on the smallest of budgets.'
The bargain bus rides are valid for travel between 23 April and 30 June 2025.
Schorling added: 'We have come so far in four years, and we're incredibly proud of the network we're delivering for our passengers and the economic impact we have on local communities. The popularity of our services has been nothing short of phenomenal and we continue growing to meet demand.'
In January, councils were told to stop putting coach stops in the worst areas of town.
It came after an industry body claimed passengers are often dropped off in 'dingy' areas.
Graham Vidler, chief executive of the Confederation of Passenger Transport (CPT), said many locations designated for coaches are 'not a great advertisement' for towns or cities.
Speaking at the organisation's annual conference in London, he said: 'If you go to many towns and cities across the country, they haven't really thought through what to do with coaches and coach passengers when they come.'
He added: 'It's not a great experience for coach passengers.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Herald Scotland
5 hours ago
- The Herald Scotland
May jobs report shows 139,000 jobs were added last month
Before the report's release, economists surveyed by Bloomberg estimated that 125,000 jobs were added last month. Job gains for March and April were revised down by a combined 95,000, portraying a weaker labor market that believed in late winter and early spring. March's total was downgraded from 185,000 to 120,000 and April's, from 177,000 to 147,000. Is the job market good or bad right now? The labor market has held up remarkably well despite the hurdles posed by Trump's economic policies, with employment gains averaging well over 100,000 a month so far this year. But many forecasters reckoned a more pronounced hiring slowdown took shape in May and would intensify in the months ahead. Trump's trade strategy lies at the center of the projected downshift. He paused the high double-digit tariffs he slapped on dozens of countries in April and in May agreed to slash levies on Chinese imports from 145% to a still-elevated 30%. China agreed to broadly similar concessions. But the moves hinge on further U.S. deals with China and other countries. And 25% tariffs remain in effect on all imported cars and many goods from Canada and Mexico. This week, Trump hiked fees on steel and aluminum imports to 50% from 25%. And while a trade court last month struck down many of Trump's tariffs, they remain in effect during an appeal, prolonging the uncertainty for businesses. Economists expect the duties to reignite inflation within a month or two and dampen consumer spending. The costs also have heightened business uncertainty, curtailing hiring and investment. How many federal employees are laid off? The Trump administration's Department of Government Efficiency has cut as many as 120,000 federal jobs but many workers have been placed on administrative leave, leaving them on U.S. payrolls pending court cases, Morgan Stanley said in a report. Still, the reductions have started to filter into the jobs numbers. Goldman Sachs estimates federal employment declined by a relatively modest 10,000 in May, adding to the 26,000 government workers that Capital Economics says already have been chopped since February. Are there still immigrants coming to America? Besides toughening enforcement at the southern border, the administration has canceled or declined to renew work permits and other protections for hundreds of thousands of migrants, economist Lydia Boussour of EY-Parthenon wrote in a note to clients. That will likely mean a smaller labor supply that further constrains hiring, especially in industries such as construction and hospitality, she said. Some calendar quirks also could have suppressed employment last month. For technical reasons, a late Easter likely boosted payrolls in April but heralds a lower tally for May as staffing levels returned to normal, Morgan Stanley said. Yet while hiring generally has slowed, other economists figured job growth remained sturdy last month as companies frustrated by labor shortages during the pandemic continued to curtail layoffs. Capital Economics and Barclays both predicted 150,000 jobs gains for May. By the end of the year, however, Barclays believes tariffs, federal layoffs and immigration curbs will slow average monthly job gains to about 75,000.


Scottish Sun
20 hours ago
- Scottish Sun
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
The blackmail message is believed to have included a racist term RANSOM DEMAND Terrifying message sent by 'Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) 'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. Sign up for Scottish Sun newsletter Sign up 2 High street retailer Marks & Spencer was hit by a cyber attack over the Easter holiday Credit: Alamy 2 M&S boss Stuart Machin, pictured, along with seven other company executives were emailed by the hackers, believed to be DragonForce Credit: PA The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. The £3.50 M&S buy that'll make your whole house smell like a 'boujee candle' Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations. A spokesperson for the company told The Sun Online: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'


The Sun
20 hours ago
- The Sun
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. 2 2 The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations.