Visualização normal

Antes de ontemStream principal
  • ✇Firewall Daily – The Cyber Express
  • Trellix Confirms Source Code Repository Breach Mihir Bagwe
    It is always a bit jarring when the "digital locksmiths" are the ones getting their locks picked. Cybersecurity firm Trellix on Saturday confirmed it suffered a breach involving its internal source code repositories, proving that even the defenders aren't immune to the threats they fight. The Incident On May 2, Trellix released a statement confirming that unauthorized parties had gained access to sections of their internal code. Upon discovering the intrusion, the company initiated a standar
     

Trellix Confirms Source Code Repository Breach

Trellix, Source Code Repository Breach, Breach

It is always a bit jarring when the "digital locksmiths" are the ones getting their locks picked. Cybersecurity firm Trellix on Saturday confirmed it suffered a breach involving its internal source code repositories, proving that even the defenders aren't immune to the threats they fight.

The Incident

On May 2, Trellix released a statement confirming that unauthorized parties had gained access to sections of their internal code. Upon discovering the intrusion, the company initiated a standard response protocol. They hired external security experts to map the extent of the breach and informed relevant authorities immediately.

Trellix maintains that there is no evidence their software distribution channels were compromised or that any leaked code has been used in active attacks.

While the "all clear" on product safety is a relief, several questions remain. Trellix has yet to identify the threat actors, the duration of the unauthorized access, or the specific volume of data stolen.

Also read: Russia’s Digital Military Draft System Hit by Cyberattack, Source Code Leaked

The High Stakes of Security Code

A breach at a firm like Trellix—born from the merger of McAfee Enterprise and FireEye—carries more weight than a standard data leak. Because Trellix provides Endpoint Detection and Response (EDR) and XDR services to governments and global banks, their source code is a roadmap for attackers.

Why Source Code is a Target:

  1. Vulnerability Research: Having the code allows hackers to hunt for "zero-day" flaws without having to guess how the software works.

  2. Supply Chain Risk: If an attacker can inject malicious code into a trusted update, they can compromise thousands of customers at once.

  3. Bypassing Defenses: Knowing how a security tool "thinks" makes it much easier for malware to stay invisible.

A Growing Trend in Tech

Trellix is far from the first titan to be targeted. They join a list of major players like Microsoft, Okta, and LastPass, all of whom have dealt with source code theft in recent years. This pattern suggests that sophisticated actors (whether cybercriminals or nation-states) are increasingly focused on the "keys to the kingdom."

For now, there isn't a "fire drill" for Trellix users. Since there is no proof of tampered software, the immediate risk remains low. Trellix has promised to be transparent as their investigation concludes. Until then, the industry is left waiting to see if this was a simple smash-and-grab or the opening move of a much larger campaign.

  • ✇Security Affairs
  • Trellix discloses the breach of a code repository Pierluigi Paganini
    Trellix disclosed a security breach affecting part of its source code repository, however, the company says there’s no sign of code misuse. Trellix revealed a breach that allowed unauthorized access to part of its source code repository. The company said it quickly launched an investigation with forensic experts and notified law enforcement. While the exact data accessed remains unclear, Trellix stated there is no evidence that its source code has been altered or exploited. “Trellix recen
     

Trellix discloses the breach of a code repository

2 de Maio de 2026, 09:55

Trellix disclosed a security breach affecting part of its source code repository, however, the company says there’s no sign of code misuse.

Trellix revealed a breach that allowed unauthorized access to part of its source code repository. The company said it quickly launched an investigation with forensic experts and notified law enforcement. While the exact data accessed remains unclear, Trellix stated there is no evidence that its source code has been altered or exploited.

“Trellix recently identified unauthorized access to a portion of our source code repository. Upon learning of this matter, we immediately began working with leading forensic experts to resolve it. We have also notified law enforcement.” reads the update published by the security firm. “Based on our investigation to date, we have found no evidence that our source code release or distribution process was affected, or that our source code has been exploited. As part of our commitment to our broader security community, we intend to share further details as appropriate once our investigation is complete.”

The company did not disclose who carried out the attack and how he did it. It is unclear how long attackers had gained access to the repository.

Unauthorized access to part of a source code repository can expose sensitive logic, APIs, or credentials. Attackers may study the code to find vulnerabilities, create exploits, or plan targeted attacks. It can also lead to intellectual property theft, reputational damage, and supply chain risks if tampered code is later distributed to customers or partners.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, security breach)

❌
❌