InfoSec News 27JAN2026

General

"npm users are responsible for vetting the content of packages that they choose to install."
At peak, we discarded around 12Gbps of traffic ingressing our router in Miami for these non-downstream prefixes.
The new investigation will assess whether the company properly assessed and mitigated risks associated with the deployment of Grok's functionalities into X in the EU. This includes risks related to the dissemination of illegal content in the EU, such as manipulated sexually explicit images, including content that may amount to child sexual abuse material.
Digital Affairs Minister Krzysztof Gawkowski said the incident came “very close to a blackout” and showed signs of a coordinated sabotage campaign. He had earlier pointed to suspected Russian involvement, even before ESET released its findings. Russia has not commented on the attribution but has previously denied such accusations.
Although the attack was thwarted, Polish authorities have stated that if successful it could have taken out power to 500,000 people in Poland. Polish officials haven't revealed how the hackers pulled off the attack or how officials determined the intent was to be disruptive or destructive, but the use of a wiper supports a conclusion that this was the intent of the attack.
The targets included two heat-and-power plants and a system for managing electricity generated from renewable sources such as wind turbines and solar farms, according to Polish authorities.

Geo-Politics

  • [CN] China has launched an investigation into two high-profile members of the military.
Zhang Youxia, the country’s most senior uniformed military officer, and Liu Zhenli, a top operational commander — have been placed under investigation following deliberation by the Chinese Communist Party’s Central Committee.
Both Zhang, the first-ranked vice chairman of the Central Military Commission (CMC) and a member of the elite Politburo, and Liu, the chief of staff at the CMC’s Joint Staff Department, were said to be suspected of “serious violations of discipline and law,” according to Xinhua.
Both men faced significant responsibilities for the intense operational tempo that Xi has demanded around Taiwan, which he has pledged to see reunified with the mainland under Communist Party rule.
Mayorov is alleged to have acted as the handler for Ilona Kopylova, a dual Ukrainian-German citizen who was arrested in Berlin earlier on suspicion of spying for Russia. German authorities believe Kopylova had been in contact with a Russian Embassy official working for an intelligence service since at least November 2023.
Easterly, who was appointed to lead America's top cyber-defense agency under the Biden administration, joined her predecessor and CISA's first-ever director Chris Krebs in President Trump's line of fire back in July.
Last week, Easterly announced that she's joined RSAC as its new CEO, and almost immediately, rumors began swirling that Trump cybersecurity officials would boycott the industry's "largest and most influential conference" to protest Easterly's appointment.
Following publication of this article, the FBI and NSA sessions and speakers have also disappeared from the cybersecurity conference’s agenda.

Privacy

  • Relying on BitLocker to protect your data? Don't expect it to prevent Law Enforcement Officers (LEO) from gaining access.
Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide... how to manage their keys,” said Microsoft spokesperson Charles Chamberlayne.
Microsoft "typically" backs up BitLocker keys to its servers when the service gets set up from an active Microsoft account. "If you use a Microsoft account, the BitLocker recovery key is typically attached to it, and you can access the recovery key online," the company explains in its documentation.
Now that the FBI and other agencies know Microsoft will comply with warrants similar to the Guam case, they’ll likely make more demands for encryption keys, Green said. “My experience is, once the U.S. government gets used to having a capability, it's very hard to get rid of it.”
Both the Home and Pro versions of Windows support disk encryption, but only the Pro versions give users full control over the process. The Home version of Windows only supports disk encryption when logged in with a Microsoft account and will only offer to store your encryption key on Microsoft’s servers.

AI

Subscribe to Deuxieme RE Banque News

Sign up now to get access to the library of members-only issues.
Jamie Larson
Subscribe