Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Global Digital Threats Monitor

    Real-time visualization of digital rights violations and security threats worldwide

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    CISOs must translate cyber threats into business risk
    June 6, 2025

    CISOs must translate cyber threats into business risk

    In today's rapidly evolving digital landscape, Chief Information Security Officers (CISOs) face the formidable challenge of bridging the gap between complex cyber threats and tangible business risks. A senior executive from Check Point emphasizes that for effective risk management and to secure buy-in from board members, CISOs must pivot from a technology-centric discourse to a narrative rooted in business impact. By translating cyber threats into business language, they can illustrate how cybersecurity initiatives align with the strategic priorities of the organization. This approach ensures that decision-makers comprehend the financial and reputational implications of cybersecurity controls, turning abstract threats into actionable intelligence. Moreover, this strategy enables CISOs to demonstrate Return on Security Investment (ROSI), thereby justifying cybersecurity spend in terms that matter to business executives. Ultimately, this shift not only aids in securing board-level support but also fosters a more cohesive, organization-wide commitment to cybersecurity, imbibing a culture where digital security is perceived as an integral part of business operations rather than a standalone IT issue.

    U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
    June 5, 2025

    U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

    On the frontline of digital security, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability found in Google’s Chromium V8 engine to its Known Exploited Vulnerabilities catalog. This move underscores the urgency and potential risks associated with the flaw, which involves an out-of-bounds read vulnerability. This type of flaw can allow attackers to read restricted parts of memory, potentially exposing sensitive information or facilitating further malware execution. The vulnerability's identification in the widely-used Chromium V8 engine, an essential component of engines like Google Chrome and other Chromium-based browsers, heightens its significance. Given the prevalent use of these browsers, the implications for unpatched systems can be severe, creating an entry point for cyber attackers. The inclusion of this vulnerability in CISA's catalog underscores the necessity for swift action among software developers and end-users alike to apply security patches and upgrades promptly. For enterprises and developers, this call to action highlights the importance of maintaining an up-to-date software inventory and implementing robust patch management strategies. The incident serves as a sobering reminder for all stakeholders of the digital ecosystem to stay vigilant and proactive in the race against potential exploits.

    New versions of Chaos RAT target Windows and Linux systems
    June 5, 2025

    New versions of Chaos RAT target Windows and Linux systems

    In a recent analysis by Acronis TRU researchers, new variants of the Chaos Remote Access Trojan (RAT) have been discovered actively targeting both Windows and Linux systems. Originally detected in 2022, these malicious software variants have adapted and resurfaced with sophisticated techniques to infiltrate computer systems, posing a significant threat to digital security globally. The attacks leveraging Chaos RAT have been strategic, demonstrating an evolution in their methods and capabilities, making them more potent against traditional security defenses. Chaos RAT is a versatile piece of malware known for its ability to execute commands, steal data, and act as a conduit for further cybercriminal activities. The latest versions are believed to incorporate enhanced evasion techniques designed to bypass security tools such as antivirus programs, facilitating unauthorized access to sensitive systems. These RATs provide threat actors with comprehensive control over infected systems, potentially allowing them to install additional malware, exfiltrate data, or disrupt operations. The recurrence of Chaos RAT underscores the dynamic nature of the threat landscape where adversaries continuously refine their tools to exploit new vulnerabilities. The renewed focus on attacking both Windows and Linux environments underlines a dangerous trend where multi-platform vulnerabilities are being targeted. This dual-platform capability amplifies the risk for businesses and individual users alike, calling for heightened vigilance and robust security measures to fortify systems against such multi-faceted threats. Administrators are urged to apply critical updates and patches, leverage advanced endpoint protection solutions, and educate users about phishing and other social engineering tactics that could be used to deliver such RATs.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2025 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More