Skip to main content
Something’s in the ’are
To:Brew Readers
IT Brew // Morning Brew // Update
The malware, that is!

What a wonderful Wednesday! Adults are helping to drive toy sales this year. Which one of you is willing to trade up your first edition Shining Charizard to jumpstart IT Brew’s Pokémon card collection?

In today’s edition:

Breathwork

Water world

Parting clouds

—Eoin Higgins, Caroline Nihill, Brianna Monsanto, Patrick Lucas Austin

CYBERSECURITY

A hand holding a needle next to a bubble.

Anna Kim

If you’re in cybersecurity, you’ve heard nonstop about the attack surface. But what if the surface is more of an atmosphere?

That’s what some experts in the field are saying as the shape and location of attacks is changing. An attack atmosphere is more accurate, the theory goes, because it encompasses myriad threats.

Chris Goettl, VP of product management at Ivanti, told IT Brew that the atmosphere term is a shift in mindset to understand the environment as a whole. Attackers have become more and more sophisticated, often not even threatening the critical vulnerabilities but rather chaining existing CVEs or using social engineering.

“Each of those things are just an evolution of behaviors that existed before with threat actors,” Goettl said. “They’re just getting more and more sophisticated.”

Attacks are changing. Here’s how to fight back.EH

Presented By YeshID

CYBERSECURITY

Computer screens with mouse cursors breaking through them

Francis Scialabba

When Mark Ellzey, a senior security researcher at Censys, stumbled upon exposed water facilities online, he thought it might have been a joke, or even a honeypot. The more the team dug, the worse it got—Censys found almost 400 web-based Human-Machine Interfaces (HMIs) for water facilities in the US unprotected online.

In order to start remediation efforts, Ellzey, Censys Principal Security Researcher Emily Austin, and the team contacted the host of the critical infrastructure, or industrial control systems (ICS), which had a “tepid response.” So, the team contacted the Environmental Protection Agency.

“A lot of people, when they think of critical infrastructure and ICS, it’s some complex protocol and stuff like that,” Ellzey said. “When all I had to do was look [on the internet]…That’s bad these things have been sitting out there for who knows how long. It feels bad in that way because it’s an exposure that should not exist.”

Within nine days of the systems being found in October, 24% of them had been secured. As of May, less than 6% of the systems are still online in read-only or unauthenticated states.

Why water facilities are under threat.CN

CLOUD

Cloud hovering over an employee working on a laptop. Credit: Anna Kim

Anna Kim

Guess who’s back, back again?

The European Union’s (EU) desire for cloud sovereignty has seemingly been reignited as geopolitical tensions push organizations to reevaluate the region’s reliance on the US for its digital infrastructure needs.

Last week, Amazon Web Services (AWS) announced it had launched a new European parent company and three subsidiaries incorporated in Germany for its European Sovereign Cloud offering. The parent company will be “locally controlled” and led by EU citizens. AWS European Sovereign Cloud is expected to roll out by the end of the year.

“There will be zero operational control outside of EU borders; the AWS European Sovereign Cloud will be operated entirely by residents of Europe,” the tech giant wrote in a blog post. “Only AWS employees, residing in the EU, will control day-to-day operations, including access to data centers, technical support, and customer service for the AWS European Sovereign Cloud.”

The EU is taking cloud sovereignty seriously.BM

Swiped right on too many apps

Morning Brew

SaaS got you sprawling? Join us on June 24 to learn how IT leaders are redefining software strategy—balancing cost, risk, and innovation in the AI era. Register now for this virtual event with IT Brew and industry experts.

Together With Bitwarden

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: $20 billion. That’s how much Amazon plans to invest in two Pennsylvania data centers complexes to support its AI and cloud computing technologies. (Axios)

Quote: “The US has exaggerated Huawei’s achievements—the company isn’t that powerful yet.”—Ren Zhengfei, CEO of Huawei, when asked about the US’s export restrictions against it (Tom’s Hardware)

Read: Order up, beep boop! A robot may be making your pepperoni pie in the future. (TechCrunch)

See it. Stop it. Guard your organization’s Google Workspace with YeshID’s Shadow IT product. Shadow IT Roast helps detect rogue SaaS, give real-time alerts, and keep your Google Workspace protected.*

*A message from our sponsor.

View of the Amazon homepage taken in Washington on December 3, 2010. Credit: Nicholas Kamm/AFP/Getty Images

Nicholas Kamm/AFP/Getty Images

Before “cloud computing” was even a term, AWS launched a service that changed tech forever. Discover how a bookstore-turned-cloud-giant shaped modern IT—and why it’s still at the center of the AI race nearly 20 years later.

The origin story of AWS.

Check it out

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2025 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.