Blog
Recent
bg
Subscribe & Save 20% off Premium or Families plans

By subscribing, you agree to receive marketing communications regarding industry news and research, educational resources, and LastPass products and services. The processing of your personal data in accordance with the LastPass Privacy Policy. You can unsubscribe from marketing communications at any time.

Browse articles
Cover Image for How the Hunt for Markus Hess Launched Today’s Data Exfiltration Defenses
Cybersecurity
How the Hunt for Markus Hess Launched Today’s Data Exfiltration Defenses
October 07, 2025 • By Shireen Stephenson
Cover Image for What Is IP Spoofing, and Is It Still Happening in 2025?
Cybersecurity
What Is IP Spoofing, and Is It Still Happening in 2025?
October 01, 2025 • By Shireen Stephenson
Cover Image for DNS Spoofing Attacks in 2025: What You Need to Know and How you Can Stop Them
Cybersecurity
DNS Spoofing Attacks in 2025: What You Need to Know and How you Can Stop Them
September 26, 2025 • By Shireen Stephenson
Cover Image for How to Protect Yourself from Malvertising in 2025 (Before It Costs You Everything)
Cybersecurity
How to Protect Yourself from Malvertising in 2025 (Before It Costs You Everything)
September 25, 2025 • By Shireen Stephenson
Cover Image for Supply Chain Attacks: How Attackers Target the Platforms You Trust and What You Can Do About It
Cybersecurity
Supply Chain Attacks: How Attackers Target the Platforms You Trust and What You Can Do About It
September 24, 2025 • By Shireen Stephenson
Cover Image for Is Your Digital identity Safe from AI-Driven Attacks or Already in the Wrong Hands?
Cybersecurity
Is Your Digital identity Safe from AI-Driven Attacks or Already in the Wrong Hands?
September 19, 2025 • By Shireen Stephenson
Cover Image for Could a Single XSS Attack Empty Your Wallet Without You Knowing?
Cybersecurity
Could a Single XSS Attack Empty Your Wallet Without You Knowing?
September 18, 2025 • By Shireen Stephenson
Cover Image for Romance Scams: Why Can’t We Trust the Words Behind the Sweetest Lies?
Cybersecurity
Romance Scams: Why Can’t We Trust the Words Behind the Sweetest Lies?
September 12, 2025 • By Shireen Stephenson
Cover Image for What Is ARP Spoofing, and Why Should You Care?
Cybersecurity
What Is ARP Spoofing, and Why Should You Care?
September 11, 2025 • By Shireen Stephenson
Cover Image for Cryptojacking: Why Ignoring It Could Cost You More than You Think
Cybersecurity
Cryptojacking: Why Ignoring It Could Cost You More than You Think
September 10, 2025 • By Shireen Stephenson
Cover Image for Exposed: 7 Types of Credit Card Fraud You Can’t Afford to Ignore
Cybersecurity
Exposed: 7 Types of Credit Card Fraud You Can’t Afford to Ignore
August 28, 2025 • By Shireen Stephenson
Cover Image for Your Practical Guide to Understanding and Defending Against Remote Code Execution (RCE)
Cybersecurity
Your Practical Guide to Understanding and Defending Against Remote Code Execution (RCE)
August 27, 2025 • By Shireen Stephenson