Trellix, the endpoint and extended detection vendor formed from the McAfee Enterprise and FireEye merger, confirmed on Friday 8 May that an unauthorised party accessed part of its source-code repository.1 The ransomware-as-a-service group RansomHouse says the compromise occurred on 17 April.2 The gap between intrusion and public disclosure is 21 days. RansomHouse has not yet published the data; the group's established pattern runs to quiet extortion rather than immediate publication.
Source-code exposure at a detection vendor carries a specific structural risk that customer-data breaches do not. Trellix produces the EDR (Endpoint Detection and Response) and XDR (Extended Detection and Response) logic that flags malicious behaviour on customer machines. An attacker with 21 days of access to that detection logic has 21 days to write evasions for it. Detection-signature value that took years to build can drain out of the product before any customer is notified, and every Trellix customer carries the downstream exposure regardless of whether their own data was touched.3
The UK Cyber Security and Resilience Bill (CS&R Bill) moved from Commons Report Stage to the Lords this session , carrying a provision requiring initial incident notification within one day of discovery. Had that provision been in force on 17 April, Trellix would have been outside it by twenty days. Lords peers now debate the Bill's Second Reading with a named, current-quarter case study rather than a hypothetical. Whether peers cite it explicitly or not, the Trellix timeline is the lived argument for why the notification window in the bill is set where it is.
