Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Global Digital Threats Monitor

    Real-time visualization of digital rights violations and security threats worldwide

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    Torq raises $140M at $1.2B valuation to scale AI-driven security hyperautomation
    January 11, 2026

    Torq raises $140M at $1.2B valuation to scale AI-driven security hyperautomation

    Torq Ltd., a pioneer in security hyperautomation, announced a significant milestone by raising $140 million in funding, bringing its valuation up to an impressive $1.2 billion. This achievement underscores the growing reliance on AI-driven solutions to enhance cybersecurity operations. Torq's platform is designed to optimize security operations by deploying artificial intelligence to automate repetitive tasks, empowering security teams to focus on strategic priorities. This substantial funding round, backed by leading investors, is set to expand Torq's market presence and accelerate the adoption of its innovative platform globally. For cybersecurity professionals, this means an unprecedented opportunity to leverage machine learning algorithms and data-driven insights to improve threat detection and response times. As cyber threats evolve and become more sophisticated, Torq's platform provides a crucial ally in the fight against digital threats by automating routine tasks and facilitating efficient workflow management. The new investment is expected to enhance product development, further refining AI capabilities and broadening the application of security hyperautomation across industries. Given the growing complexity of cybersecurity challenges, the seamless integration of Torq's platform into existing security frameworks can lead to significant improvements in operational efficiency and data protection capabilities.

    Instagram’s “17 Million User Data Leak” Was Just Scraped Records from 2022
    January 11, 2026

    Instagram’s “17 Million User Data Leak” Was Just Scraped Records from 2022

    In a resurfaced event that has raised eyebrows in the cybersecurity community, Instagram's data leak involving 17 million user records turns out to be a case of data scraping from back in 2022. The records, which were misleadingly presented as a new breach in 2026, have actually been parts of a scrape made public in 2023. This incident highlights the enduring challenges of data scraping and misinformation in the cyber world. Hackread.com's analysis indicates that the records were not acquired through a new cyberattack but were instead collected through authorized methods, which points towards the inadequacy of using only preventive methods without timely verification and response. Data scraping, unlike conventional breaches, involves systematically collecting publicly accessible data through loopholes or lax APIs, putting users' residual data privacy at risk long after their data is officially disclosed. Such repackaging of old data underscores the necessity of ongoing vigilance in digital security practices. The improper framing of existing issues as new threats can erode trust and obscure the actual risk landscape. Instagram users should remain aware of how persistent data can be manipulated and misrepresented, impacting user privacy expectations. This incident calls for enhanced mechanisms to evaluate the integrity of data leaks and better tools to differentiate fresh compromises from rehashed events. For organizations and users alike, it stresses the critical need to stay informed about historical data issues that might resurface with misleading portrayals, necessitating a continuous review of security protocols and communication strategies.

    Week in review: PoC for Trend Micro Apex Central RCE released, Patch Tuesday forecast
    January 11, 2026

    Week in review: PoC for Trend Micro Apex Central RCE released, Patch Tuesday forecast

    In a significant development in the cybersecurity landscape, cybersecurity researchers have released a Proof of Concept (PoC) for a Remote Code Execution (RCE) vulnerability in Trend Micro's Apex Central. This alarming vulnerability could allow threat actors to remotely execute arbitrary code, potentially impacting organizations relying on Trend Micro for their cybersecurity defense. The release of this PoC creates an urgent need for organizations to patch their systems to prevent exploitation. Additionally, the Patch Tuesday forecast reveals the importance of keeping abreast of software updates and security patches to maintain robust defenses against emerging threats. Meanwhile, the pharmaceutical industry continues to grapple with underestimated cybersecurity risks beyond the typical data breaches. Industry expert Chirag Shah highlights how risks such as intellectual property theft and supply chain attacks are often overlooked despite their potential to cause significant disrupt. The healthcare and pharmaceutical sectors are urged to rethink their cybersecurity strategies to address these multifaceted threats. Organizations are advised to collaborate closely with cybersecurity professionals to enhance their security posture. This week in review underscores the continuous evolution of cyber threats, emphasizing the necessity for vigilant security practices and proactive risk management strategies. As the digital threat landscape becomes increasingly sophisticated, staying informed about vulnerabilities and adopting timely security measures becomes paramount for businesses across all sectors, including WordPress website owners who must remain alert to common security threats that can impact their platforms.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More