Blog
Recent
bg
Subscribe & Save 20% off Premium or Families plans

By subscribing, you agree to receive marketing communications regarding industry news and research, educational resources, and LastPass products and services. The processing of your personal data in accordance with the LastPass Privacy Policy. You can unsubscribe from marketing communications at any time.

Browse articles
Cover Image for 8 Ways to Protect Against Ransomware Attacks
Cybersecurity
8 Ways to Protect Against Ransomware Attacks
March 24, 2026 • By LastPass
Cover Image for How to Conduct User Access Reviews in Your Organization
Cybersecurity
How to Conduct User Access Reviews in Your Organization
March 18, 2026 • By LastPass
Cover Image for 8 Common Social Engineering Attacks (and How to Avoid Them)
Cybersecurity
8 Common Social Engineering Attacks (and How to Avoid Them)
March 13, 2026 • By LastPass
Cover Image for What Cloud IAM Gets Right and How LastPass Business Max Delivers it for Small and Scaling Companies
Cybersecurity
What Cloud IAM Gets Right and How LastPass Business Max Delivers it for Small and Scaling Companies
March 04, 2026 • By Shireen Stephenson
Cover Image for Attention Small Businesses: Why LastPass Wins for 2FA Reliability in 2026
Cybersecurity
Attention Small Businesses: Why LastPass Wins for 2FA Reliability in 2026
February 24, 2026 • By Shireen Stephenson
Cover Image for 32% of Small Businesses Would Close from a $10,000 Loss – Here's How Adaptive Authentication Prevents It
Cybersecurity
32% of Small Businesses Would Close from a $10,000 Loss – Here's How Adaptive Authentication Prevents It
February 17, 2026 • By Shireen Stephenson
Cover Image for 26 Major Breach Studies Expose Critical Gaps: Your Cyber Resilience Strategy for 2026
Cybersecurity
26 Major Breach Studies Expose Critical Gaps: Your Cyber Resilience Strategy for 2026
February 05, 2026 • By Liz Corbett
Cover Image for Your Small Business Guide to Agentic AI Identity & Access Management (2026)
Cybersecurity
Your Small Business Guide to Agentic AI Identity & Access Management (2026)
February 03, 2026 • By Shireen Stephenson
Cover Image for What Are Zero-Day Exploits, and Why Are They So Dangerous in 2026?
Cybersecurity
What Are Zero-Day Exploits, and Why Are They So Dangerous in 2026?
January 21, 2026 • By Shireen Stephenson
Cover Image for New Phishing Campaign Targeting LastPass Customers
Threat Intel
New Phishing Campaign Targeting LastPass Customers
January 20, 2026 • By Threat Intelligence, Mitigation, and Escalation (TIME) team
Cover Image for SSRF Attacks Are Up 452%: Here’s Your 5-Minute Business-Friendly SSRF Prevention Guide
Cybersecurity
SSRF Attacks Are Up 452%: Here’s Your 5-Minute Business-Friendly SSRF Prevention Guide
January 13, 2026 • By Shireen Stephenson
Cover Image for What Is Cross Site Request Forgery? The 5-Minute CSRF Guide for Business Owners
Cybersecurity
What Is Cross Site Request Forgery? The 5-Minute CSRF Guide for Business Owners
January 07, 2026 • By Shireen Stephenson