
This very serious leak brings into question the amount of trust companies place in closed source password management solutions and what you should do if your LastPass vault has been stolen. The newly expanded scope of the LastPass breach has stirred the cybersecurity industry turning LastPass users into high-risk targets and shaken the confidence of zero-knowledge password manager users. Hackers have had their hands on LastPass user’s vaults for weeks, maybe even months since LastPass has yet to confirm the original breach date, leaving us all wondering how many of LastPass’s 25.6 million users are going to be among the next very targeted attack.

Linked personal accounts will remain unaffected by the iteration changes enforced upon the LastPass Business end user account.Additionally, they will receive an email notification of a "Recent Upgrade" confirming that their hash iteration value has been updated.

Once the policy is enforced, upon the next user login, their vault will be automatically updated to the hashing iteration value configured within the policy.If desired, LastPass admins can enforce this policy immediately (in LastPass Business, for both federated and non-federated login users) by destroying all user sessions and forcing user logoff via the Admin Console.In order for the policy to take effect, end users will need to log out of LastPass.Master password" policy, please note the following: Before you enable the "Control hash iterations for
