![]() ![]() These URLs may contain extremely sensitive information, such as parameters that are used for logging in, resetting passwords etc. Unencrypted website URLs – URLs saved by the LastPass browser extension, which provide a partial history of the website that the LastPass user has visited.These credentials allowed the attackers to copy a backup of customer vault data. ![]() ![]() What exactly was breached this time?Īs claimed in this latest update, the attackers were able to use the previously-leaked technical data to target another LastPass employee which had more credentials and keys. However – a few days ago (December 22nd) LastPass issued an update to this security incident, claiming that more information was compromised. This specific statement about user data was reiterated many times. However – while source code and technical information was stolen, no user data was compromised and no services were interrupted. The disclosure maintained that an unauthorized party gained access to the LastPass development environment through a single compromised developer account. Last August, the maintainers of the LastPass cloud-based password manager tool reported a security breach in their servers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |