Blog
Recent
bg
Subscribe & Save 20% off Premium or Families plans

By subscribing, you agree to receive marketing communications regarding industry news and research, educational resources, and LastPass products and services. The processing of your personal data in accordance with the LastPass Privacy Policy. You can unsubscribe from marketing communications at any time.

Browse articles
Cover Image for Could Your Device Be Part of a Botnet Without You Knowing?
Cybersecurity
Could Your Device Be Part of a Botnet Without You Knowing?
December 12, 2025 • By Shireen Stephenson
Cover Image for How Did Account Takeover Attacks Lead to More than $262 million in Losses This Year, and Were You a Target?
Cybersecurity
How Did Account Takeover Attacks Lead to More than $262 million in Losses This Year, and Were You a Target?
December 11, 2025 • By Shireen Stephenson
Cover Image for Has the World’s First AI-Orchestrated Cyber Espionage Campaign Changed Cyber Defense Forever?
Cybersecurity
Has the World’s First AI-Orchestrated Cyber Espionage Campaign Changed Cyber Defense Forever?
December 05, 2025 • By Shireen Stephenson
Cover Image for What Is an Evil Twin Attack and How to Stop It in 2026
Cybersecurity
What Is an Evil Twin Attack and How to Stop It in 2026
November 26, 2025 • By Shireen Stephenson
Cover Image for What Are Malware Attacks? Types, Examples, and How to Prevent Them
Cybersecurity
What Are Malware Attacks? Types, Examples, and How to Prevent Them
November 20, 2025 • By Shireen Stephenson
Cover Image for Dr. Felix Hernandez Unmasks Deepfakes: What You Must Know to Spot Them and Stay Safe in 2026
Cybersecurity
Dr. Felix Hernandez Unmasks Deepfakes: What You Must Know to Spot Them and Stay Safe in 2026
November 18, 2025 • By Shireen Stephenson
Cover Image for Will 2025 Be the Year You Learn What Honeywords Are, and Why Attackers Hate Them?
Cybersecurity
Will 2025 Be the Year You Learn What Honeywords Are, and Why Attackers Hate Them?
October 28, 2025 • By Shireen Stephenson
Cover Image for Prompt Injection Attacks in 2025: When Your Favorite AI Chatbot Listens to the Wrong Instructions
Cybersecurity
Prompt Injection Attacks in 2025: When Your Favorite AI Chatbot Listens to the Wrong Instructions
October 24, 2025 • By Shireen Stephenson
Cover Image for What Is Browser Hijacking and Why Your Search Results Can’t Be Trusted
Cybersecurity
What Is Browser Hijacking and Why Your Search Results Can’t Be Trusted
October 22, 2025 • By Shireen Stephenson
Cover Image for Undercover Bytes: Packet Sniffing in Cyber Espionage
Cybersecurity
Undercover Bytes: Packet Sniffing in Cyber Espionage
October 17, 2025 • By Shireen Stephenson
Cover Image for The Rise and Reign of Computer Worms: Inside the Battle for Control
Cybersecurity
The Rise and Reign of Computer Worms: Inside the Battle for Control
October 15, 2025 • By Shireen Stephenson
Cover Image for Juice Jacking in 2025: Want a Side of Malware with That Free Charge?
Cybersecurity
Juice Jacking in 2025: Want a Side of Malware with That Free Charge?
October 09, 2025 • By Shireen Stephenson