Skip to main content
Let’s connect!
To:Brew Readers
IT Brew // Morning Brew // Update
How IoT is integrating AI.

It’s Monday! The Grammys are this weekend. What do you listen to while you work? Do you go with Bad Bunny? Kendrick? The company’s AI policy on audio? Whatever you’re listening to, put it on the loudspeaker today, and let people know who you are!

In today’s edition:

The AI of things

Pen there, done that

Roses are red, my screen is blue

—Eoin Higgins, Brianna Monsanto

HARDWARE

INternet of things trash

Vectormine/Getty Images

AI is everywhere, and the IoT space is no exception—as networks of “smart” devices evolve, they’ll need to incorporate new technologies.

At this year’s CES, we talked to tech experts about how the IoT sector is changing, and how AI fits into it.

Do the evolution. There is a “Cambrian explosion” of AI capabilities right now, Akamai EVP and CTO Bobby Blumofe told IT Brew, and it’s spreading to the IoT space. For professionals in that sector, he said, the potential goes beyond LLMs and chatbots.

“A lot of the real value that we’re getting out of AI, whether it’s to detect fraud, recommend products, drive a car autonomously, or run a robot in a warehouse—in almost all cases, those are not LLMs,” Blumofe said. “Those are deep learning models that are specialized to solving the particular problem at hand.”

One CIO compares today’s AI to electricity.EH

Presented By Airia

CYBERSECURITY

Cyber security

Unsplash

Same misconfigurations, different day.

That’s how ethical hackers described misconfigurations they observed in 2025 that still place organizations at risk.

Kent Ickler, senior penetration tester at Black Hills Information Security, told IT Brew that he has been doing penetration testing for years, and while missteps by companies haven’t changed much, they have evolved with the times.

“The weakest link is still the person. It’s still the employee,” Ickler said.

Same old, same old. During a Nov. 18 panel at Live! 360 Tech Con in Orlando, Florida, Onevinn CTO Stefan Schörling said it’s still common to see service accounts added to domain admins, a mistake that can lead to major issues if that account is compromised.

Also: Adversaries are calling the help desk.BM

CYBERSECURITY

Blue screen of death frowny face

Francis Scialabba

It’s the moment we all dread: Your laptop flashes the infamous blue screen of death. But in this case, it isn’t a critical system error fixed by a few keystrokes. Instead, you’ve unintentionally installed malware on your device.

Campaign summary. That’s the core of a new malware campaign dubbed PHALT#BLYX, which was revealed by Securonix threat researchers in a Jan. 5 blog post. The researchers claim to have seen the PHALT#BLYX campaign evolve from an easy-to-detect infection chain into its now-sophisticated form, with a focus during this past holiday season on the hospitality industry.

The attack is straightforward: Victims receive an email that appears to come from hotel booking website Booking.com, notifying them of a reservation cancellation and soliciting a large fee. The email causes the victim, who’s likely panicked, to click the link leading to a malicious domain impersonating Booking.com, complete with a fake error message. (The emails’ fake room charges are in Euros, suggesting the campaign is targeting people in Europe.)

Guess what happens if you click “refresh.”—BM

Together With BetterCloud

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: $1,047,000. That’s how much money security researchers earned at this year’s Pwn2Own Automotive hacking competition, held last week in Tokyo. Hackers found 76 zero-day vulnerabilities in-vehicle infotainment (IVI) systems, EV chargers, and car operating systems. (Bleeping Computer)

Quote: “When IT professionals feel they’re being evaluated based on badge swipes, not real accomplishments, they will either act accordingly or look to work elsewhere.” Rebecca Wettemann, CEO at IT analyst firm Valoir, on mandates to work from the office (CIO)

Read: An open-source project surrenders to the slop and scraps its bug-bounty program. (Ars Technica)

Activate AI—ASAP: Get your AI workflows running smarter, faster, and without the IT headaches. Airia’s AI platform helps you automate processes, streamline operations, and scale productivity. Get started now.*

*A message from our sponsor.

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2026 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew