Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

NCSC Warns of an AI-Fuelled “Vulnerability Patch Wave”

May 5, 2026

Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

May 5, 2026

Trellix Reveals Unauthorized Access to Source Code

May 5, 2026
Facebook X (Twitter) Instagram
Tuesday, May 5
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Trellix Reveals Unauthorized Access to Source Code
Cyber Security

Trellix Reveals Unauthorized Access to Source Code

Team-CWDBy Team-CWDMay 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A leading US cybersecurity vendor has been breached by threat actors who managed to access its source code, it has been revealed.

Privately held firm Trellix disclosed the incident on May 4, claiming it has notified law enforcement and is working with “leading forensic experts” in order to work out exactly what happened.

“Trellix recently identified unauthorized access to a portion of our source code repository,” it said.

“Based on our investigation to date, we have found no evidence that our source code release or distribution process was affected, or that our source code has been exploited.”

Read more on supply chain incidents: Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks

Trellix is the company formed from the merger of McAfee Enterprise and FireEye in 2021 after they were acquired by private equity firm Symphony Technology Group. It sells threat intelligence and AI-powered detection and response services including NDR and EDR, as well as data security and email security.

Access to its source code could give threat actors a major advantage, warned Isaac Evans, found of software security firm Semgrep.

“For security companies, it can provide attackers with a roadmap to where controls live, how detections are written, and where trusted update or build paths may be exposed,” he said.

“This recent pattern of targeting security vendors and software supply chains should have the full attention of defenders. Attackers are not only looking for customer data; they are looking for leverage. If they can understand defensive tooling from the inside, they can turn the software ecosystem itself into a delivery mechanism.”

Links to Supply Chain Attacks

It’s unclear who is responsible for the breach, and Trellix is keeping tight lipped for now, saying only that it will share details once the investigation is complete.

However, several vendors – including Aqua Security and Checkmarx – were compromised recently after a software supply chain attack targeting security scanner Trivy, which exposed countless enterprise secrets.

Google Cloud’s Wiz Security reported at the end of March that the TeamPCP group behind the Trivy campaign may be collaborating with notorious extortion group Lapsus$ to monetize these stolen credentials.

There are also signs that TeamPCP is working with the Vect ransomware group to target Trivy campaign victims.

“Stolen tokens, CI/CD gaps, and overtrusted build workflows can let attackers move from one project to another, harvesting secrets and planting persistence along the way,” said Evans. “Organizations shouldn’t treat code repositories as just a place where code lives and is stored, but something that needs to be protected as attackers continuously find new ways to exploit and manipulate them.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSmall Defense Firms Lack Network Data to Stop Nation-State Hackers
Next Article Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware
Team-CWD
  • Website

Related Posts

Cyber Security

Why Organizations Need to do Protect Against Phishing-as-a-Service

May 1, 2026
Cyber Security

How YKK Is Securing the World’s Largest Zipper Manufacturing Operation

April 30, 2026
Cyber Security

Npm Supply Chain Attack Uses Worm-Like Propagation

April 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.