We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.
How we work to protect digital rights and empower communities
Raising awareness about digital rights, privacy threats, and security best practices.
Advocating for policies and regulations that protect digital rights and freedoms.
Providing training and resources on digital security for vulnerable groups.
Offering direct assistance to individuals and organizations facing digital threats.
Creating networks of digital rights defenders to share knowledge and resources.
Working with partners globally to develop solutions to digital security challenges.
Latest WordPress security vulnerabilities affecting plugins, themes, and core.
Published Date: Mar 31, 2026
The Auto Post Scheduler WordPress plugin up to version 1.84 is vulnerable to Cross-Site Request Forgery (CSRF) due to missing nonce validation in the 'aps_options_page' function. This vulnerability could allow attackers to change the plugin settings and inject malicious scripts if they can convince an administrator to click a manipulated link.
Published Date: Mar 31, 2026
The Ibtana – WordPress Website Builder plugin is affected by a Stored Cross-Site Scripting (XSS) vulnerability, allowing contributors and above to inject malicious scripts through the 'ive' shortcode. This vulnerability affects versions up to 1.2.5.7 and results from inadequate sanitization of input and insufficient output escaping.
Published Date: Mar 31, 2026
The WooPayments: Integrated WooCommerce Payments plugin for WordPress is susceptible to unauthorized data modification. This vulnerability exists due to a missing capability check in the 'save_upe_appearance_ajax' function, allowing unauthenticated attackers to alter plugin settings in versions up to 10.5.1.
Stay informed about the latest digital rights issues, threats, and community resources
Recently, India has ramped up its cybersecurity measures in response to the rising threat posed by cybercriminals, often referred to as 'cyber pirates.' Key governmental and regulatory bodies, including the Indian Computer Emergency Response Team (CERT-In), Reserve Bank of India (RBI), Securities and Exchange Board of India (SEBI), and the Ministry of Defence have issued a series of advisories aimed at strengthening the digital fortifications of crucial sectors. These sectors include energy utilities, telecommunications, banks, and stock exchanges—all critical components of national infrastructure that are vulnerable to cyberattacks. The directives encourage these sectors to adopt more robust cybersecurity practices, emphasizing the need for regular security audits, implementing strong encryption mechanisms, and fostering a culture of cybersecurity awareness among employees. Additionally, there is a focus on enhancing incident response protocols to ensure a swift and effective reaction to any potential breaches. This initiative signifies a pivotal moment in India’s approach to national cybersecurity, reflecting a global trend towards acknowledging the significant risk posed by cyber threats. By preparing these digital 'moats,' India aims to fortify its defense mechanisms, making it more challenging for cybercriminals to exploit vulnerabilities in critical systems. The economic implications of such national efforts are substantial, potentially preventing costly disruptions and maintaining the trust of international partners and investors.
At the RSAC 2026, TrendAI™ Research showcased its innovative exploration into the burgeoning threats at the intersection of artificial intelligence and cybersecurity. By conducting two pivotal research sessions, the initiative delved into two critical areas: agentic AI cybercrime and electric vehicle (EV) infrastructure security. Agentic AI has emerged as a dual-use technology that can empower both defenders and attackers in cyberspace. The ability of AI-driven systems to autonomously adapt and evolve has heightened the stakes in cybersecurity, necessitating new defense mechanisms tailored to combat these intelligent threats. TrendAI™ Research has been at the forefront of creating frameworks to detect and mitigate risks associated with such AI threats, seeking to ensure a trustworthy AI ecosystem. In parallel, the growing utilization of AI within cyber-physical systems, such as EV charging stations, presents another layer of complexity. As these infrastructures become increasingly networked, they present lucrative targets for cybercriminals. Attendees at RSAC 2026 were introduced to innovative methodologies for safeguarding these systems against breaches that could compromise both data integrity and physical safety. The sessions underscored the importance of DDoS protection, intrusion detection systems, and the development of protocols that can effectively isolate and manage threats in real-time. Overall, the RSAC 2026 discussions led by TrendAI™ Research highlighted the necessity for a robust, multi-layered defense strategy that integrates AI ethics, robust AI audits, and advanced endpoint protection. In an era where AI accelerates both innovation and risk, the emphasis was placed on collaboration between developers, security experts, and policymakers to develop sustainable cybersecurity practices.

In the vast realm of cybersecurity, WordPress stands as one of the most widely used content management systems. However, its popularity attracts both legitimate developers and cybercriminals who exploit vulnerabilities for malicious purposes. A significant threat to WordPress security is the use of nulled plugins—unauthorized versions of premium plugins that people download for free from illegitimate sources. These plugins entice site owners with the allure of premium features without costs, but they conceal grave security risks. Once integrated into a website, these nulled plugins often come embedded with malicious code—ranging from backdoors to adware—that can compromise website data, facilitate malware distribution, and even redirect site visitors to harmful websites. Besides security breaches, nulled plugins can harm a site’s SEO and result in search engine blacklisting, adversely affecting traffic and reputation. Site owners using nulled plugins often miss out on vital updates and security patches, making them easy targets for cyberattacks. Moreover, legal implications arise as these plugins violate software licensing agreements, potentially leading to lawsuits. Hence, while seemingly minor, the choice to use nulled plugins can unravel a cascade of detrimental consequences for WordPress site owners, underscoring the importance of investing in legitimate plugin licenses to ensure site security and integrity.
Join us in defending digital rights and protecting vulnerable communities.
Get in touch to discuss your needs or how you can support our mission
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.