Back to Industry

Industry - Data Breach

moderateAnti-PrivacyData Breach

Executive Summary

Cybersecurity firm Trellix disclosed that attackers gained unauthorized access to a portion of its source code repository, affecting a company that protects over 200 million endpoints for 50,000 business and government customers worldwide. The company is investigating with forensic experts and has notified law enforcement, stating it has found no evidence the source code was exploited or altered. Trellix has not yet disclosed whether customer or corporate data was stolen or when the breach wa...

What Happened

Cybersecurity firm Trellix disclosed in May 2026 that attackers gained unauthorized access to a portion of its source code repository. Trellix, formed from the 2021 merger of McAfee Enterprise and FireEye, serves over 50,000 business and government customers worldwide and protects more than 200 million endpoints. The company is investigating with forensic experts and has notified law enforcement, stating it has found no evidence the source code was exploited or altered. Trellix has not disclosed when the breach was detected or whether customer or corporate data was also stolen.

Who Is Affected

The breach potentially affects Trellix's 50,000 business and government customers globally, whose security infrastructure relies on Trellix products protecting over 200 million endpoints. If the stolen source code is exploited, attackers could identify vulnerabilities in Trellix security products, potentially compromising the organizations and individual users those products are meant to protect. The company has not confirmed whether customer data or corporate information was accessed during the breach.

Why It Matters

This incident highlights the growing trend of attackers targeting cybersecurity companies themselves, as evidenced by similar recent breaches at Checkmarx, Cisco, and HackerOne in early 2026. When security vendors are compromised, the ripple effects can be enormous because their products protect critical infrastructure across thousands of organizations. Access to source code could allow attackers to discover zero-day vulnerabilities in widely deployed security products, potentially enabling large-scale attacks against Trellix customers before patches can be developed and distributed.

What You Should Do

If you are a Trellix customer, monitor official company communications for updates about the investigation and any required security actions. Ensure all Trellix products are updated to the latest versions as patches become available. Review your security logs for unusual activity that could indicate exploitation of Trellix products, and consider implementing additional monitoring or compensating controls until more information is available about the scope of the breach.

Summary generated from verified sources and reviewed before publication. How we summarize.

Cybersecurity firm Trellix disclosed that attackers gained unauthorized access... - Industry | PrivacyWire