Update: Continuing investigation Our investigation continues with support from independent external security partners. We continue to find no evidence of unauthorised access to customer data or Intercom accounts. All Intercom services remain fully operational. You are only potentially affected if your developers installed intercom-client@7.0.4 (npm) or intercom-php@5.0.2 during the affected window on April 30. The compromised package versions (intercom-client@7.0.4 and intercom-php@5.0.2) remain removed. Safe versions: intercom-client@7.0.3 and intercom-php@5.0.1. If you do not use these developer packages to interact with the Intercom REST API, you are not impacted. We are keeping this incident open while we complete our remediation and investigation. We will update this page when we are ready to close it out.
Last update on
MAP Growth performance has stabilized. We’re continuing to investigate potential causes and closely monitoring apps and services. You can continue to check this page for updates and/or click on the "SUBSCRIBE TO UPDATES" button above to receive updates via email or text.
Last update on
Monitors
myNHA - Attendance Management
myNHA - College-Readiness
myNHA - Course Management
NHA School Sites - Excel
Raptor Technologies