Skip to main content
Inventory Control
To:Brew Readers
IT Brew // Morning Brew // Update
Malicious actors are racking up exposed LLMs for nefarious purposes.

Agentic AI, for when spreadsheets and hope are no longer enough. Join IT Brew and PwC to see it in action. Register here.

In today’s edition:

State of attack

Generational change

Futur-quanta

—Billy Hurley, Eoin Higgins

CYBERSECURITY

a tech question mark

Emily Parsons

For an easy question—how many states are there in the United States?—mysterious groups on the internet seem intent on asking it 27,000 times.

Possible attackers are pairing scan-the-internet scripts with innocuous prompts like the aforementioned USA query to find large language models (LLMs) accessible without the need to authenticate, according to recent reports from cybersecurity training group SANS Institute and cybersecurity company GreyNoise.

Researchers said these LLM-ventories could support a range of adversarial tasks, including compute theft and extraction of restricted information.

After investigating their honeypot infrastructure, GreyNoise researchers detected:

  • Two IPs launching “a methodical probe of 73+ LLM model endpoints,” access points that use APIs to interact with the system.
  • Beginning on December 28, 2025, the scanners generated over 80,000 sessions in 11 days. According to the post, they aimed to find “misconfigured proxy servers” leaking access.

When life gives you exposed LLMs, make absolute havoc.BH

Presented By Airia

CYBERSECURITY

Technology use age gap

Cagkansayin/Getty Images

There’s an assumption in cybersecurity that the youth—Gen Z—are more savvy than their older counterparts. That’s not necessarily true.

In a December panel discussion hosted by software security company Veracode, “How Gen Z Is Reshaping the Cyber Threat Landscape,” participants covered how different generations approach cybersecurity. The conclusions were somewhat surprising, particularly for Gen Z.

Young town. Digitally native Gen Z might be expected to exercise more caution online. But, according to panelist Caitlin Sarian, a cybersecurity influencer who goes by Cybersecurity Girl, that’s not the case. In fact, growing up immersed in tech may make younger people even more susceptible than older generations.

But don’t get it twisted: No one is safe, says one expert.—EH

HARDWARE

A quantum computer

John D/Getty Images

Much like the Lumière brothers’ train, quantum computing is rushing toward the public—and users aren’t likely anticipating the changes in store.

At this year’s CES, Murray Thom, VP of quantum technology evangelism at D-Wave Quantum, told IT Brew that he feels people overcomplicate their thinking about quantum computing: “It’s energy-efficient compute for very hard problems.”

For D-Wave’s customers, he added, the technology’s applications are already streamlining processes and boosting efficiency, saving manpower hours for Pattison Food Group and helping Japanese phone operator NTT Docomo reduce paging signals.

“Those are very real-world, tangible applications; they’re not research projects, we’re not doing abstract mathematical problems,” Thom said. “And it’s incorporated in their business.”

What a quantum x AI looks like.EH

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: $2,409,886. That’s how much a $500 check signed by Steve Jobs in 1976, and used to help form Apple, sold for at a January auction. (CNET)

Quote: “The sooner the AI bubble bursts, the better it will be for almost all of us, except the AI whizzes.”—Dean Baker, co-founder of the Center for Economic and Policy Research, on his bullish take on the bright side of the AI bubble burst (Futurism)

Read: Game over? Some game developers aren’t fond of how GenAI is impacting their industry. (GameSpot)

Activate AI—ASAP: Get your AI workflows running smarter, faster, and without the IT headaches. Airia’s AI platform helps you automate processes, streamline operations, and scale productivity. Get started now.*

*A message from our sponsor.

image of human and robot shaking hands out of computers

Svetazi/Getty Images

Despite heavy investment in AI, only 12% of companies are considered true AI leaders. A new report breaks down what’s holding enterprises back and what separates AI maturity from experimentation.

Read now

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2026 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

A mobile phone scrolling a newsletter issue of IT Brew