We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.
How we work to protect digital rights and empower communities
Raising awareness about digital rights, privacy threats, and security best practices.
Advocating for policies and regulations that protect digital rights and freedoms.
Providing training and resources on digital security for vulnerable groups.
Offering direct assistance to individuals and organizations facing digital threats.
Creating networks of digital rights defenders to share knowledge and resources.
Working with partners globally to develop solutions to digital security challenges.
Real-time visualization of digital rights violations and security threats worldwide
Stay informed about the latest digital rights issues, threats, and community resources
In a strategic move to bolster its defense against the increasing surge of cyber attacks, Ukraine has entered into a collaborative agreement with Sweden. This partnership signifies a crucial step in Ukraine's ongoing battle to safeguard its digital infrastructure against Russian cyber assaults. According to both parties, the alliance aims to enhance Ukraine's defensive capabilities by leveraging Sweden’s advanced cyber technology and expertise. The collaboration isn't just a safeguard for Ukraine; it represents an opportunity for Sweden to upgrade its own cybersecurity measures by learning from the intense cyber challenges faced by Ukraine. This bilateral agreement includes the exchange of knowledge, development of new defense frameworks, and real-world applications where Swedish systems can be tested against sophisticated cyber threats akin to those experienced by Ukraine. For Ukraine, this alliance enhances its technological resilience, providing critical insights and infrastructural support to protect against malicious activities aimed at disrupting the nation’s information systems. Discussions about expanding their cybersecurity cooperation have sparked interest at the European level, with potential for a wider network of EU nations contributing to this cybersecurity fortification. These efforts align with a broader global trend of collaborative defense against state-sponsored cybercrime, illustrating the necessity of combined international efforts to prevent future attacks. The agreement also highlights the increasing importance of cybersecurity in geopolitical strategies, as nations recognize the cyber realm as a new frontier in national security.

The European Union (EU) is stepping up its cybersecurity strategy by advocating for the development of offensive cyber capabilities. According to Henna Virkkunen, the EU's technology chief, this move is vital to deter and defend against growing cyber threats. Offensive cyber capabilities, in this context, involve proactive measures that can be deployed not just to defend EU digital infrastructures but to potentially neutralize threats before they can materialize into significant disruptions. Given the rapid evolution and increasing frequency of cyberattacks, especially those that target critical infrastructures and key digital assets across the EU, the need for such proactive measures is becoming more urgent. The proposal reflects a broader strategic shift in how the EU views its cybersecurity posture. Rather than merely focusing on defensive measures such as firewalls and threat monitoring systems, the EU is considering operations that might involve counter-intrusions into threat actors' systems, disrupting their activities before they can attack. This new approach also underscores the geopolitical dimension of cybersecurity. As cyber threats often emanate from state actors or state-sponsored groups with sophisticated technologies, the EU's capability to launch or threaten cyber offensive measures could act as a deterrent. It serves as a signal that the EU is ready to respond to significant cyber-attacks with equal force. Nevertheless, concerns about the ethical implications of cyber offense remain. Questions about oversight, accountability, and the risk of escalation in cyber conflict are part of ongoing debates among policymakers and cybersecurity experts. Overall, the call for offensive capabilities emphasizes the EU's commitment to protecting its digital sovereignty and the security of its members’ online ecosystems.

A critical security flaw has been discovered in the popular WPvivid Backup & Migration plugin, potentially putting nearly a million WordPress websites at risk. This vulnerability allows attackers to upload arbitrary files to the server, which can ultimately lead to remote code execution. This type of vulnerability is especially dangerous as it enables malicious actors to execute commands or inject malware remotely, potentially compromising an entire website’s security. WPvivid is widely used by WordPress site owners to manage backups and migrations seamlessly. However, without proper security checks, this convenience can be exploited by threat actors. The flaw originates from insufficient validation of user inputs, allowing files to penetrate the server without thorough inspection. Once uploaded, these files can be used to execute commands on the server. Website administrators are advised to update the plugin to its latest version immediately, ensure that their WordPress installation and other plugins are up to date, and to regularly monitor for any unusual activity on their sites. This incident highlights the importance of regular software updates and the need for robust security practices to safeguard online assets against ever-evolving threats. Cybersecurity experts recommend enabling security plugins that provide real-time firewall protection and malware scanning to enhance the defensive posture of WordPress sites.
Join us in defending digital rights and protecting vulnerable communities.
Get in touch to discuss your needs or how you can support our mission
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.