Skip to main content
Travel advisory
To:Brew Readers
IT Brew // Morning Brew // Update
Malicious actors are targeting the hospitality sector using AI. How are companies fighting back?

It’s Tuesday! Your SOC can’t scale on caffeine alone. On April 28, learn how AI can take on the busywork so your team can focus on the threats that actually matter. Register now.

In today’s edition:

Book ’em

🪲 CVE crisis

Massive (DDoS) attack

—Brianna Monsanto, Caroline Nihill

CYBERSECURITY

Computer with mouse arrows on a square grid

Francis Scialabba

United we stand, divided we fall…and by fall, we mean succumb to the advanced cyber-schemes lobbed at the travel industry.

The hospitality sector may not be the industry hardest-hit by cybercriminals (that would be the manufacturing industry, as per IBM’s 2026 X-Force Threat Intelligence Index report), but Booking.com CSO Marnie Wilking told IT Brew that it has drawn more malicious attention in recent years, making it essential for everyone in the industry to work together and stay up-to-date with the threats.

“It’s definitely become more targeted over the last several years, especially post-Covid, when travel really picked back up again, and has really gone crazy since then,” Wilking said. “So, there’s clearly quite a bit of money to be made there.”

What are threat actors up to these days? Unsurprisingly, Wilking said AI is making phishing emails more polished, and helping malicious actors create convincing fake property listings on Booking.com and other marketplace websites.

More about the inside of the company’s strategy against fraud.BM

Sponsored By JumpCloud

CYBERSECURITY

A silver shied surrounded by a bug silhouette, pie chart, and binary code

Amelia Kinsinger

Like many people in their mid-twenties, the Common Vulnerabilities and Exposures (CVE) program, a cornerstone of the cybersecurity industry, is having a quarter-life crisis.

At RSAC 2026, CVE board members voiced their concerns about the longevity of the 26-year-old vulnerability catalog program, which is sponsored by CISA and managed by the MITRE Corporation, as it faces financial and administrative hurdles.

Uphill battle. Katie Noble, director of product security incident response team (PSIRT) and bug bounty at Intel, told the audience that funding remains a large issue for the CVE program, along with the “human glue” holding it together. Last April, the cybersecurity industry erupted when federal funding for the CVE program almost expired; after that, CISA extended its contract for another 11 months.

“The board, we’ve tried for years to highlight issues, and sometimes they get through and sometimes they don’t,” Noble said. “I don’t think that we can afford to continue at the pace with the tools that we currently have in order to make real progress. I think we’re just going to be left in the dust.”

The program faces bureaucratic and financial hurdles.BM

CYBERSECURITY

geopolitical risk

Getty Images

Even during a tenuous two-week ceasefire, hacktivist actors are using the US-Israel war with Iran to hit online targets with distributed denial-of-service (DDoS) attacks, according to new reports.

Ashley Bather, senior intelligence analyst at Intel 471, said that while the company has seen Israeli entities be targeted by “massive amounts” of attacks, organizations in the Gulf region who do business with the US have also found themselves in the crosshairs.

Intel 471’s blog breaks down how observed incidents have been claimed not only from pro-Iran groups, but also from pro-Russian ones.

DDoS attacks, Bather said, are “a very easy way for threat actors to show quick participation in any kind of form…They don’t have to sit and develop malware, or try to join a group that lets them work with ransomware or join an affiliate program—it’s very simple.”

More on the conflict’s impact.CN

Together With Eaton

JOBS

CollabWORK connects you to the hidden job market through IT Brew and other trusted channels. Browse roles curated specifically for this community by clicking through to the job board.

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: $13 million. That’s how much US-sanctioned crypto exchange Grinex claims hackers have stolen from it. As a result, the organization is stopping services. (Ars Technica)

Quote: “The thing with agentic systems is now you can have agents just read your business policies and generate the software…This is going to disintermediate these SaaS vendors and these ERP vendors.”—Booz Allen CTO Bill Vass, on a “SaaS-pocalypse” (Tech Brew)

Read: Unless Atlassian customers are able to pay for data privacy by August, their metadata, which includes readability scores and complexity ratings, will be used to train the company’s AI models. (The Register)

Upgrade your security muscle memory: Scripts and service accounts were just the beginning. JumpCloud transforms your IAM into an intelligent foundation, turning autonomous AI agents into assets. Secure the third identity today.*

* A message from our sponsor.

SHARE THE BREW

Share the Brew

Share the Brew, watch your referral count climb, and unlock brag-worthy swag.

Your friends get smarter. You get rewarded. Win-win.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2026 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew