Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Global Digital Threats Monitor

    Real-time visualization of digital rights violations and security threats worldwide

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE
    April 21, 2025

    FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE

    The cybersecurity landscape continues to evolve as new threats emerge. Recently, cybersecurity experts have identified a new wave of ransomware attacks involving the notorious FOG Ransomware. This strain is being disseminated by cybercriminals who falsely claim affiliations with popular cryptocurrency communities, specifically DOGE. Such claims are strategic, aiming to increase the perceived trustworthiness and outreach of the malicious campaign. Detailed analysis of these attacks reveals that FOG ransomware is cleverly concealed within seemingly innocuous software downloads and email attachments, which once activated, encrypts the victim's data, demanding cryptocurrency payments for recovery. The complexity of these attacks is heightened by their sophisticated delivery methods and the ever-present threat of social engineering. The attackers target various sectors, but website owners, especially those utilizing WordPress, should exercise heightened vigilance. The open-source nature of WordPress makes it a frequent target for attackers seeking to exploit vulnerabilities in outdated plugins and themes to disseminate malware. This alarming trend underscores the importance of implementing robust cybersecurity measures, including regular software updates, comprehensive backups, and heightened security protocols. Staying informed and prepared is crucial in this digital age to thwart the persistent threats posed by ransomware and other malware attacks.

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 42
    April 20, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 42

    The Security Affairs Malware Newsletter Round 42 delves into the latest developments in malware threats, providing an in-depth analysis of their impact on the cybersecurity landscape. This edition highlights a concerning trend: malicious NPM packages that have been cleverly crafted to target PayPal users. These NPM (Node Package Manager) packages, often used in JavaScript-based development environments, represent a significant risk as they can be seamlessly integrated into widespread developer tools. The newsletter uncovers the tactics used by these cybercriminals and offers insights into their potential implications for users worldwide. Another focal point of this edition is the emergence of a new malware variant, ResolverRAT, which has been added to the ever-complex web of cyber threats. ResolverRAT is characterized by its sophisticated evasion techniques and robustness, making it a formidable adversary for security professionals. The newsletter provides a comprehensive overview of its mechanisms and targets and highlights the importance of staying vigilant in an era where digital attacks are increasingly sophisticated. For WordPress website owners, this newsletter underscores the urgency of maintaining a robust security posture by emphasizing the exploitation of commonly used tools and plugins in recent attacks. It serves as a reminder of the ever-evolving nature of digital threats and the need for constant vigilance and adaptation in cybersecurity measures.

    Hackers using malware to steal data from USB flash drives
    April 20, 2025

    Hackers using malware to steal data from USB flash drives

    In recent developments in the cybersecurity landscape, hackers have increasingly turned their attention to USB flash drives as a conduit for disseminating malware. This method is particularly effective because USB drives are universally used across various industries, making them a prime target for cybercriminals seeking to exploit security vulnerabilities. Infected USB drives can stealthily breach an organization’s defense mechanisms, allowing malware to spread autonomously once connected to a computer system. This form of attack bypasses more traditional security measures, such as firewalls and antivirus software, which are typically focused on network-based threats and may not adequately scan removable media. Once a system is compromised, malware can exfiltrate sensitive data, monitor user activities, or even establish a backdoor for future access. The implications are alarming, as this threat vector effectively allows attackers to infiltrate not just single systems, but potentially entire networks, especially in environments where file sharing is common. Organizations need to adopt advanced protective measures that include regular scanning of USB devices, educating staff about the risks of unchecked device usage, and implementing device access controls that limit the usage of removable storage to essential processes only. With cyber threats becoming more sophisticated, ensuring USB protections are part of a comprehensive security strategy is vital for safeguarding data integrity and privacy.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2025 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More