Blog
Recent
Cover Image for DNS Spoofing Attacks in 2025: What You Need to Know and How you Can Stop Them
Cybersecurity
DNS Spoofing Attacks in 2025: What You Need to Know and How you Can Stop Them
September 26, 2025 • By Shireen Stephenson
Cover Image for North American Cyber Threats, Infostealers, and North Korean IT Workers: What We Covered in the Third Episode of The Phish Bowl
Threat Intel
North American Cyber Threats, Infostealers, and North Korean IT Workers: What We Covered in the Third Episode of The Phish Bowl
September 25, 2025 • By Stephanie Schneider
bg
Subscribe & Save 20% off Premium or Families plans

By subscribing, you agree to receive marketing communications regarding industry news and research, educational resources, and LastPass products and services. The processing of your personal data in accordance with the LastPass Privacy Policy. You can unsubscribe from marketing communications at any time.

Cover Image for How to Protect Yourself from Malvertising in 2025 (Before It Costs You Everything)
Cybersecurity
How to Protect Yourself from Malvertising in 2025 (Before It Costs You Everything)
September 25, 2025 • By Shireen Stephenson
Cover Image for Supply Chain Attacks: How Attackers Target the Platforms You Trust and What You Can Do About It
Cybersecurity
Supply Chain Attacks: How Attackers Target the Platforms You Trust and What You Can Do About It
September 24, 2025 • By Shireen Stephenson
Cover Image for Still Using Windows 10? Here's How to Reset Your Windows 10 Password Like a Pro
Tips And Tricks
Still Using Windows 10? Here's How to Reset Your Windows 10 Password Like a Pro
September 23, 2025 • By Shireen Stephenson
Cover Image for Is Your Digital identity Safe from AI-Driven Attacks or Already in the Wrong Hands?
Cybersecurity
Is Your Digital identity Safe from AI-Driven Attacks or Already in the Wrong Hands?
September 19, 2025 • By Shireen Stephenson
Cover Image for Large-Scale Attack Targeting Macs via GitHub Pages Impersonating Companies to Attempt to Deliver Stealer Malware
Threat Intel
Large-Scale Attack Targeting Macs via GitHub Pages Impersonating Companies to Attempt to Deliver Stealer Malware
September 18, 2025 • By Alex Cox, Mike Kosak & Stephanie Schneider
Cover Image for Could a Single XSS Attack Empty Your Wallet Without You Knowing?
Cybersecurity
Could a Single XSS Attack Empty Your Wallet Without You Knowing?
September 18, 2025 • By Shireen Stephenson
Cover Image for LastPass Completes IRAP Assessment: Strengthening Our Commitment to Australian Government Security Standards
News & Insights
LastPass Completes IRAP Assessment: Strengthening Our Commitment to Australian Government Security Standards
September 17, 2025 • By Matthew McWhirter
Cover Image for The Simple Steps to Resetting Your Spectrum Account, Router, and Wi-Fi Passwords Like a Pro
Tips And Tricks
The Simple Steps to Resetting Your Spectrum Account, Router, and Wi-Fi Passwords Like a Pro
September 16, 2025 • By Shireen Stephenson
Cover Image for Romance Scams: Why Can’t We Trust the Words Behind the Sweetest Lies?
Cybersecurity
Romance Scams: Why Can’t We Trust the Words Behind the Sweetest Lies?
September 12, 2025 • By Shireen Stephenson