Skip to main content
Bad buddy
To:Brew Readers
IT Brew // Morning Brew // Update
BonziBuddy and the early days of spyware.

Welcome back! We know companies have been rebranding themselves as AI-first, so it’s only a matter of time until your coworkers start doing it too. Don’t be surprised when new hires proclaim their affinity for AI as their fun fact during staff introductions.

In today’s edition:

With buddies like these

Bot rot

We need to talk

—Brianna Monsanto, Eoin Higgins

RETROSPECTIVE

Desktop virtual assistant Bonzi Buddy. (Credit: Bonzi Buddy)

BonziBuddy

Well, hello there! I don’t think we’ve been properly introduced. I’m Bonzi.

For some folks, the above may trigger memories of an animated purple gorilla that told the occasional joke and helped them surf the web. For others, those words may be a reminder of what felt like the beginning of the end for their computer.

In the early 2000s, spyware—malicious software, also referred to as adware, that collects information about a person without their consent—was as pervasive as velour tracksuits, scandalous tabloid magazines, and low-rise jeans.

“It was normal for almost everyone that was going to the internet to be at some point infected or annoyed by these things,” said Luis Corrons, a security evangelist at Gen.

BonziBuddy was arguably a poster child for early spyware programs. The intelligent software agent, which was free to download, masqueraded as an innocent tool that could assist users with basic tasks such as calendar reminders. However, the software would soon cause issues for users, like Malwarebytes co-founder and CEO Marcin Kleczynski, who downloaded the cartoon personal assistant for fun. Then it overstayed its welcome.

How annoying could it get?BM

Presented By ThreatLocker

CLOUD

Mouse arrows huddling towards a protective screen overlayed on search bars. (Credit: Anna Kim)

Anna Kim

Houston, we have a bot problem…

Web traffic to some webpages has started to resemble a Los Angeles freeway as AI bots, also known as crawlers, increasingly overload servers with requests. An April Imperva report found that automated traffic, including both “good” and “bad” bots, made up 51% of all web traffic last year. While this marks the first time bot traffic has surpassed human activity, WP Engine VP of Product Management Christine McKee told IT Brew that the influx of automated traffic feels familiar.

“I would say that it’s similar to when spam came into the world and email, where all of a sudden people started getting more and more emails, and it was slowing down the whole system,” she said.

For WP Engine, a hosting platform that hosts over 1.5 million WordPress websites across more than 150 countries, defending websites in its network against the unintended effects of high bot traffic is a top priority, according to McKee. McKee told IT Brew that the platform has seen a “definite rise” in the traffic experienced by its supported websites.

Read more on the battle of the bots.BM

IT STRATEGY

Servers

Unsplash

Listen up—let’s have a conversation.

That’s what IT and OT divisions should be saying to one another, but all too often wires get crossed. And that presents opportunities for attackers, Dragos SVP of Intelligence and Services Kurt Gaudette told IT Brew at last month’s RSAC.

“Hey, we’ve got to get this done together,” Gaudette said. “Let’s build security for IT and OT.”

Closed off. Most departments would reach out to IT for help. But OT has traditionally been stubborn and resistant to an open door between the two—an attitude that Gaudette said is unfortunately shared by their counterparts. And with OT, often the way that attack is manifesting itself just looks like an error that they can manually change. That’s a management problem, and one that has some major hurdles to get past.

How to bridge the gap.EH

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: 483, 126. That’s how many Catholic Health patients were impacted by a Serviceaide data leak caused by a misconfigured database. (Hackread)

Quote: “LOL or dumpster fire is not the best way to talk about it internally because that’s what’s going to show up [in litigation].”—Matt Jones, partner at WilmerHale, on why security professionals should be wary of inserting humor into their incident-related communications with staff (CSO Online)

Read: It’s time to (officially) meet CISA’s new deputy director. (The Register)

Surf the web: And stay safe in it, with ThreatLocker® Web Control. After a few simple network configurations (all handled by ThreatLocker), you can document prohibited sites, protect your network from unmanaged devices, and stay compliant.*

*A message from our sponsor.

A woman standing in front of an AI head and surrounded by digital tech

Amelia Kinsinger

From Y2K (2000) to cloud computing (2006) and the rise of streaming (2007), IT has transformed the world. This 25-year project dives into pivotal moments like the Slammer virus (2003) and AWS’s launch, shaping today’s digital landscape. Discover the past to navigate the future of tech.

Check it out

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2025 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.