We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.
How we work to protect digital rights and empower communities
Raising awareness about digital rights, privacy threats, and security best practices.
Advocating for policies and regulations that protect digital rights and freedoms.
Providing training and resources on digital security for vulnerable groups.
Offering direct assistance to individuals and organizations facing digital threats.
Creating networks of digital rights defenders to share knowledge and resources.
Working with partners globally to develop solutions to digital security challenges.
Real-time visualization of digital rights violations and security threats worldwide
Stay informed about the latest digital rights issues, threats, and community resources

In a startling revelation concerning digital security practices, a state auditor has discovered a lapse in security controls within the Western Australia (WA) government's Microsoft 365 deployment. This deficiency led to a staggering $71,000 defrauding incident and jeopardized sensitive data concerning children's welfare. The breach points to inadequate security measures, such as insufficient identity verification processes and a general lack of comprehensive cybersecurity protocols within governmental departments. The state's reliance on cloud-based systems, while advantageous for operational efficiency, proved a double-edged sword due to poor implementation of security controls. This incident underscores the critical importance of robust digital security strategies, especially when dealing with cloud infrastructures like Microsoft 365. Such platforms, despite their inherent advantage in resource accessibility and collaborative efficiency, require stringent safeguarding to protect sensitive information. The audit revealed specific vulnerabilities, including inadequate multi-factor authentication and ineffective access restrictions, which were exploited to facilitate unauthorized entry and subsequent data breaches. This breach serves as a crucial reminder of the potential financial and reputational damage that can arise from insufficient security practices. The findings stress the need for continuous monitoring and updating of security protocols to defend against the ever-evolving landscape of cyber threats. As businesses and government entities increasingly transition to digital environments, this incident highlights the necessity of prioritizing cybersecurity, with an emphasis on proactive measures to protect sensitive and personal information from unauthorized access and exploitation.

In the ever-evolving landscape of cybersecurity threats, recent developments have spotlighted weaponized OAuth redirection logic as a vehicle for malware distribution. This sophisticated form of cyberattack manipulates the OAuth protocol, a widely used authorization standard, to redirect unsuspecting users to malicious sites. By exploiting vulnerabilities in OAuth redirection, attackers can seamlessly inject malicious scripts or software. This method is particularly concerning because it bypasses traditional security measures, leveraging the trust users place in reputable services that use OAuth for authentication and authorization purposes. Notably, this type of attack has not only caught the attention of cybersecurity professionals but also highlights the urgent need for secure coding practices and careful review of third-party integrations. This week's cybersecurity brief also draws attention to BlacksmithAI, an open-source, AI-powered penetration testing framework that uses a network of AI agents to simulate sophisticated cyberattacks. BlacksmithAI represents a new frontier in cybersecurity defense, providing organizations with heightened adaptability in detecting and neutralizing threats. Furthermore, this upcoming Patch Tuesday is expected to bring critical updates that address various vulnerabilities, underscoring the importance of routine software updates and patch management. As malicious actors continuously adapt and seek new avenues of attack, these updates serve as a vital line of defense, emphasizing the pivotal role of vigilance and responsive action in maintaining cybersecurity integrity.
Chaim Mazal's journey from a precocious preteen fascinated by the arts of hacking to a seasoned cybersecurity executive is both inspiring and emboldening for budding cybersecurity professionals. At a young age, Mazal’s insatiable curiosity found a home within an online hacker community. Rather than leading him down a path of cybercrime, this engagement endowed him with a deep understanding of cybersecurity's nuts and bolts. Fast forward a few years, Mazal has seamlessly transitioned from hacking for leisure to defending enterprises from the growing specter of digital threats. His unconventional path into cybersecurity challenges traditional career trajectories and highlights the value of hands-on, community-centered learning. This transformation was not just about swapping a hoodie for a suit; it signified a broader commitment to using his skills to protect sensitive data in an era where breaches are alarmingly common. Mazal's story underscores the importance of looking beyond conventional qualifications. His ability to preemptively identify and mitigate potential cyber threats makes him an invaluable asset in the current digital security landscape. As the cybersecurity environment evolves, professionals like Chaim Mazal embody a hybrid approach, blending hands-on hacking experience with formal security protocols to safeguard vital digital infrastructures. This blend of experiences has become increasingly critical as companies face more sophisticated cyber threats that require a nuanced understanding of both offensive and defensive cyber tactics.
Join us in defending digital rights and protecting vulnerable communities.
Get in touch to discuss your needs or how you can support our mission
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.