Info is scant, but such breaches can reveal where a security product’s controls are located and how detections are designed, giving attackers a leg up.
First seen on darkreading.com
Jump to article: www.darkreading.com/cyberattacks-data-breaches/trellix-source-code-breach-supply-chain-threats
![]()

