-->
#1 Trusted Cybersecurity News Platform
Followed by 5.70+ million
The Hacker News Logo
Get the Latest News
cybersecurity

Threat Investigation | Breaking Cybersecurity News | The Hacker News

Category — Threat Investigation
Trellix Confirms Source Code Breach With Unauthorized Repository Access

Trellix Confirms Source Code Breach With Unauthorized Repository Access

May 02, 2026 Data Breach / Enterprise Security
Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source code repository and that it began working with "leading forensic experts" to resolve the matter immediately. It also said it has notified law enforcement of the matter. Trellix did not disclose the exact nature of the data that may have been accessed by the attackers. However, it pointed out that there are no indications that its source code has been affected or exploited. "Based on our investigation to date, we have found no evidence that our source code release or distribution process was affected, or that our source code has been exploited," the company added.  The company did not share any details about who may be behind the incident, and for how long the attackers had access to its systems. Trellix noted that additional information will b...
AI SOC Analysts: Propelling SecOps into the future

AI SOC Analysts: Propelling SecOps into the future

Jan 28, 2025 Threat Hunting / SecOps
Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged as a critical solution. This blog explores how an AI SOC Analyst transforms alert management, addressing key SOC challenges while enabling faster investigations and responses. Security operations teams are under constant pressure to manage the relentless flow of security alerts from an expanding array of tools. Every alert carries the risk of serious consequences if ignored, yet the majority are false positives. This flood of alerts bogs down teams in a cycle of tedious, repetitive tasks, consuming valuable time and resources. The result? Overstretched teams are struggling to balance reactive alert “whack-a-mole” chasing with proactive threat hunting and other strategic security initiatives.  Core challenges High alert volumes: Security operations teams receive hundreds t...
Expert Insights Articles Videos
Cybersecurity Resources