![]() ![]() Fortunately, this information remains secure with 256-bit AES encryption and can only be decrypted with the user’s master password, which LastPass doesn’t have access to due to its zero-knowledge architecture. ![]() The cybercriminal was also able to obtain information on customers’ vault data, containing both unencrypted data (such as websites) and encrypted data (usernames, passwords, secure notes, and form-filled data). However, in December 2022, the company discovered that the hacker was able to copy sensitive information, which contained account information and related metadata, including company names, end-user names, billing addresses, email addresses, telephone numbers, and IP addresses. At the time, the security team thought it was able to contain the incident, as there was no evidence that any customer data or encrypted password vaults were accessed. The bad actor’s activity lasted four days, and some of the software’s code and technical information were taken.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |