If you are using LastPass to store credentials, you should consider your vault potentially compromised. Steps:
1. Rotate LastPass Main Password and all the stored credentials (both passwords and 2FA seeds)
2. Be sure you are not reusing passwords or compromised passwords.
3. Enable FIDO MFA wherever possible.
4. Consider migrating to another password manager (e.g. Bitwarden, 1Password) by exporting your LastPass vault: https://support.lastpass.com/help/export-your-passwords-and-secure-notes-lp040004
#lastpass #breach
How do I export my LastPass vault data? - LastPass Support

You can export your LastPass vault data (including passwords, secure notes, form fills, Wi-Fi passwords, etc.) as a CSV or XML file, then print your data if you'd like to keep a copy for your own records. If you have set up vault identities, you can export data for all or individual identities.

@evaristegal0is in what way are bitwarden and 1password less vulnerable to hacking than lastpass?

@arealibrarian @evaristegal0is 1password derives the vault master key merging your password with a random 128bit key stored on your device. This guarantees a high entropy master key independently from the entropy of the passwords and at the same time makes it unfeasible brute-forcing the vault without the private secret key which is never sent to the cloud service. KeepassXC also allows you to work in a similar way by creating an additional random key on a file which is merged with the password. Bitwarden, just like lastpass, relies only on your password.

*EDIT: corrected a typo