Skip to main content
Hacking ‘Hackers’
To:Brew Readers
IT Brew // Morning Brew // Update
The weirdest cinematic hacks of the 90s are real-life threats now.

Thursday’s back again! It’s not TV, and it might not be the HBO you remember—Warner Bros. is putting itself up for sale.

In today’s edition:

IT Brew movie club: ‘Hackers’

Google’s ransomware trap

EDR killers

—Billy Hurley

CYBERSECURITY

A still from the 1995 film "Hackers" displayed on an old computer screen, with pixelated cursors pointing toward it, alongside a promotional photo of the cast contained in a shape.

Illustration: Anna Kim, Photos: Frank Trapper / Getty Images, Adobe Stock

Hackers rollerbladed into theaters almost exactly 30 years ago. The 1995 movie features young, fashionable, rebellious techies (Jonny Lee Miller, Angelina Jolie, Matthew Lillard, and others) as they go up against a corrupt security officer (Fisher Stevens) framing them for an oil-tanker cyberattack.

The film is filled with additional, less final-level hacks that range from realistic to eye-rollistic, including but not limited to streetlights, class schedules, permanent records, and school sprinklers.

Nathan Hunstable remembers watching Hackers shortly after its release, when he was a young teenager who had “zero interest in computers.” Now CISO at CEC Entertainment, owner of Chuck E. Cheese, Hunstable’s interest in computers has upped a bit.

Hack the planet.BH

Presented By ThreatLocker

CYBERSECURITY

The Google logo in pieces

Francis Scialabba

Google wants to nip ransomware in the bud.

In an announcement on Sept. 30, the company unveiled an AI-powered detection for its cloud-storage platform Drive. The new feature notices file changes that reek of ransomware—like lots of rapid encryption or a sudden change in extensions (for example, from .doc to locked)—and immediately stops file-syncing between a machine and Drive.

The company believes its mechanism serves a valuable place between anti-malware options that detect ransomware in the opening phases of an attack and backup options that restore ransomware files in the latter phases.

“We want to lay a trap for attackers right after the attack starts,” Luke Camery, lead group product manager for Google Workspace, said during a Sept. 24 news briefing in advance of the announcement.

Traptastic.BH

CYBERSECURITY

AICPA audit

Sandwish/Getty Images

Endpoint detection and response (EDR), a mainstay security tool for small and large organizations, has lately had to fend off threat actors’ attempts to “kill,” “freeze,” or otherwise disable it.

And to make the challenge even more intense, these attackers are sharing their EDR R&D with each other.

“Even though these groups are competitors and have different business and affiliate models, there appears to be information/tool leakage between them,” researchers from cybersecurity company Sophos wrote in the conclusion of its August 6 report.

Cool down.BH

Together With Iru

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: 10%. That’s how much of its shares chipmaker AMD offered OpenAI for a penny each, part of the circular logic of AI deals that has some observers believing there’s a bubble. (the Wall Street Journal)

Quote: “A delusion or an unusual idea should never be reinforced in a person who has a psychotic disorder.”—Ragy Girgis, Columbia University professor of clinical psychiatry, on how speaking to AI tools like ChatGPT is negatively affecting the mentally ill (Wired)

Read: Using the ocean to generate—and store—electricity may be a new step forward in alternative energy. (TechCrunch)

No more open doors: Hackers love open ports, weak permissions, and risky settings. Let DAC by ThreatLocker® help you find and flag these gaps before they become serious security breaches. Lock it down.*

*A message from our sponsor.

JOBS

CollabWORK connects you to the hidden job market through IT Brew and other trusted channels. Browse roles curated specifically for this community by clicking through to the job board.

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2025 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

A mobile phone scrolling a newsletter issue of IT Brew