LastPass confirms another security breach, customer data accessed this time – Neowin




















































Neowin · with 20 comments
Back in August, password management company LastPass confirmed that it has suffered a cybersecurity incident in which its development environment was accessed. This resulted in some snippets of its code and proprietary technical documentation being stolen while customer data remained safe.
However, the firm has suffered yet another security breach, and this time, customer data has been accessed.
In an update to his initial security incident notice, LastPass CEO Karim Toubba has publicly disclosed that the company has detected unusual activity in an unnamed third-party cloud storage service provider that is used by both LastPass and its affiliate GoTo.
As such, the firm has launched an investigation into the matter while engaging cybersecurity firm Mandiant and alerting law enforcement. So far, it has determined that a malicious actor utilized information from the August breach to gain access to “certain elements” of customer data on the shared cloud. However, customer passwords remain encrypted and safe.
That said, this is an ongoing investigation as LastPass assesses the impact of the breach. LastPass products and services are currently functional but customers have been advised to follow best practices listed here.
It is unclear when we will hear an update on the matter but this is expected as the situation is evolving and this is still an active investigation. We’ll let you know when we hear more on the topic.
with 4 comments
with 8 comments
with 2 comments
with 14 comments




Please enter your reason for reporting this comment.
microsoft weekly
windows 11 promo
edge flags
cider app
olauncher
windows 11 insider preview
windows 11 promo
windows update
live captions
twirl 93
windows 11 ads
© Since 2000 Neowin LLC. All trademarks mentioned are the property of their respective owners.

source


CyberTelugu

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top

Adblock Detected

Please consider supporting us by disabling your ad blocker

Refresh Page