Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    MEDIUM (6.7)
    Plugin

    Cross-Site Request Forgery Vulnerability in Auto Post Scheduler Plugin

    Published Date: Mar 31, 2026

    The Auto Post Scheduler WordPress plugin up to version 1.84 is vulnerable to Cross-Site Request Forgery (CSRF) due to missing nonce validation in the 'aps_options_page' function. This vulnerability could allow attackers to change the plugin settings and inject malicious scripts if they can convince an administrator to click a manipulated link.

    MEDIUM (5.3)
    Plugin

    Stored Cross-Site Scripting in Ibtana WordPress Website Builder Plugin

    Published Date: Mar 31, 2026

    The Ibtana – WordPress Website Builder plugin is affected by a Stored Cross-Site Scripting (XSS) vulnerability, allowing contributors and above to inject malicious scripts through the 'ive' shortcode. This vulnerability affects versions up to 1.2.5.7 and results from inadequate sanitization of input and insufficient output escaping.

    MEDIUM (6.3)
    Plugin

    Unauthorized Data Modification in WooPayments Plugin for WordPress

    Published Date: Mar 31, 2026

    The WooPayments: Integrated WooCommerce Payments plugin for WordPress is susceptible to unauthorized data modification. This vulnerability exists due to a missing capability check in the 'save_upe_appearance_ajax' function, allowing unauthenticated attackers to alter plugin settings in versions up to 10.5.1.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    Cyber pirates at large, India readies moats
    March 31, 2026

    Cyber pirates at large, India readies moats

    Recently, India has ramped up its cybersecurity measures in response to the rising threat posed by cybercriminals, often referred to as 'cyber pirates.' Key governmental and regulatory bodies, including the Indian Computer Emergency Response Team (CERT-In), Reserve Bank of India (RBI), Securities and Exchange Board of India (SEBI), and the Ministry of Defence have issued a series of advisories aimed at strengthening the digital fortifications of crucial sectors. These sectors include energy utilities, telecommunications, banks, and stock exchanges—all critical components of national infrastructure that are vulnerable to cyberattacks. The directives encourage these sectors to adopt more robust cybersecurity practices, emphasizing the need for regular security audits, implementing strong encryption mechanisms, and fostering a culture of cybersecurity awareness among employees. Additionally, there is a focus on enhancing incident response protocols to ensure a swift and effective reaction to any potential breaches. This initiative signifies a pivotal moment in India’s approach to national cybersecurity, reflecting a global trend towards acknowledging the significant risk posed by cyber threats. By preparing these digital 'moats,' India aims to fortify its defense mechanisms, making it more challenging for cybercriminals to exploit vulnerabilities in critical systems. The economic implications of such national efforts are substantial, potentially preventing costly disruptions and maintaining the trust of international partners and investors.

    TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats
    March 31, 2026

    TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats

    At the RSAC 2026, TrendAI™ Research showcased its innovative exploration into the burgeoning threats at the intersection of artificial intelligence and cybersecurity. By conducting two pivotal research sessions, the initiative delved into two critical areas: agentic AI cybercrime and electric vehicle (EV) infrastructure security. Agentic AI has emerged as a dual-use technology that can empower both defenders and attackers in cyberspace. The ability of AI-driven systems to autonomously adapt and evolve has heightened the stakes in cybersecurity, necessitating new defense mechanisms tailored to combat these intelligent threats. TrendAI™ Research has been at the forefront of creating frameworks to detect and mitigate risks associated with such AI threats, seeking to ensure a trustworthy AI ecosystem. In parallel, the growing utilization of AI within cyber-physical systems, such as EV charging stations, presents another layer of complexity. As these infrastructures become increasingly networked, they present lucrative targets for cybercriminals. Attendees at RSAC 2026 were introduced to innovative methodologies for safeguarding these systems against breaches that could compromise both data integrity and physical safety. The sessions underscored the importance of DDoS protection, intrusion detection systems, and the development of protocols that can effectively isolate and manage threats in real-time. Overall, the RSAC 2026 discussions led by TrendAI™ Research highlighted the necessity for a robust, multi-layered defense strategy that integrates AI ethics, robust AI audits, and advanced endpoint protection. In an era where AI accelerates both innovation and risk, the emphasis was placed on collaboration between developers, security experts, and policymakers to develop sustainable cybersecurity practices.

    The Security Risks of Using Nulled WordPress Plugins
    March 30, 2026

    The Security Risks of Using Nulled WordPress Plugins

    In the vast realm of cybersecurity, WordPress stands as one of the most widely used content management systems. However, its popularity attracts both legitimate developers and cybercriminals who exploit vulnerabilities for malicious purposes. A significant threat to WordPress security is the use of nulled plugins—unauthorized versions of premium plugins that people download for free from illegitimate sources. These plugins entice site owners with the allure of premium features without costs, but they conceal grave security risks. Once integrated into a website, these nulled plugins often come embedded with malicious code—ranging from backdoors to adware—that can compromise website data, facilitate malware distribution, and even redirect site visitors to harmful websites. Besides security breaches, nulled plugins can harm a site’s SEO and result in search engine blacklisting, adversely affecting traffic and reputation. Site owners using nulled plugins often miss out on vital updates and security patches, making them easy targets for cyberattacks. Moreover, legal implications arise as these plugins violate software licensing agreements, potentially leading to lawsuits. Hence, while seemingly minor, the choice to use nulled plugins can unravel a cascade of detrimental consequences for WordPress site owners, underscoring the importance of investing in legitimate plugin licenses to ensure site security and integrity.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More