Crowdfunding service GiveSendGo came back online Tuesday after a Sunday hack forced the site to temporarily shut down.
“Sunday evening, February 13th, GiveSendGo was attacked by malicious actors attempting to eliminate the ability of its users to raise funds,” the company said in a statement posted to Twitter, acknowledging the hack publicly for the first time and announcing that the site was back online.
During the dizzying days after the November 2020 election, the Homeland Security cyber-security chief was fired by a frustrated President Donald Trump, then went on national TV to insist the election was fully secure.
“There was no indication or evidence that there was any sort of hacking or compromise of election systems on, before or after November 3,” ex-Cyber-Security and Infrastructure Agency Chief Chris Krebs declared on “60 Minutes.”
On Thursday, nearly a year later, federal prosecutors in New York unsealed a dramatic indictment that conflicts with that clean bill of health.
A security firm claims that foreign hackers have infiltrated at least nine companies in several crucial sectors of the economy and government, including defense, energy, technology, and others, according to CNN.
Palo Alto Networks (PAN) shared the information on the breaches with CNN, showing that other affected sectors include education and healthcare. They say that the National Security Agency (NSA) is working with cybersecurity researchers to expose this and other ongoing efforts by foreign entities to hack American infrastructure. PAN’s report included information contributed by a division of the NSA which focuses exclusively on threats against American industrial defense bases by foreign hackers.
Examples of the breaches include the inconspicuous theft of passwords, with the goal of using these passwords to remain inside these networks for a prolonged period of time without anyone even being aware that there was a breach. This would allow hackers to freely receive sensitive data sent over basic communications such as email or information contained on internal storage drives.
Hackers obtained customer data from McDonald’s after breaching the company’s systems in the U.S., South Korea and Taiwan, according to The Wall Street Journal.
U.S. employees’ and franchisees’ contact information, seating capacity of U.S. locations and the dimensions of play areas at restaurants in the U.S were all exposed during the breach, McDonald’s said Friday, The Wall Street Journal reported. While McDonald’s said the hack didn’t cause disruptions at any of its locations, it vowed to launch an investigation into the breach and continue to invest in bolstering its cybersecurity protocol.
“McDonald’s will leverage the findings from the investigation as well as input from security resources to identify ways to further enhance our existing security measures,” the global fast food chain told U.S. employees in an internal message, according to the WSJ.
An unauthorized party accessed donor and fundraiser information for months from Virginia Hospital Center (VHC), who has served the Washington, D.C. area for 75 years. The company, Blackbaud, also reported many of its other clients’ donor and fundraising data jeopardized by the hackers.
VHC stored donors’ personal information. This included names, addresses, phone numbers, email addresses – even birth dates and the last four digits of credit card numbers. Hackers had access to these records for approximately three months, from February to May. However, the last traces of hacking didn’t cease until early June.