We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.
How we work to protect digital rights and empower communities
Raising awareness about digital rights, privacy threats, and security best practices.
Advocating for policies and regulations that protect digital rights and freedoms.
Providing training and resources on digital security for vulnerable groups.
Offering direct assistance to individuals and organizations facing digital threats.
Creating networks of digital rights defenders to share knowledge and resources.
Working with partners globally to develop solutions to digital security challenges.
Latest WordPress security vulnerabilities affecting plugins, themes, and core.
Published Date: Apr 15, 2026
The WooBeWoo Product Pricing Table plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) due to insufficient nonce validation in certain functions. This allows attackers to conduct unauthorized actions such as injecting web scripts or deleting pricing tables by tricking administrators into interacting with malicious requests.
Published Date: Apr 15, 2026
The MetForm Pro plugin for WordPress suffers from improper input validation in versions up to and including 3.9.7, enabling attackers to manipulate payments. The issue arises from the plugin's failure to validate user-submitted calculation field values against configured form prices in its payment integrations.
Published Date: Apr 15, 2026
The WebStack theme for WordPress is susceptible to arbitrary file uploads due to insufficient file type validation. This vulnerability affects all theme versions up to 1.2024, potentially allowing unauthenticated attackers to upload malicious files to the server, which could lead to remote code execution.
Stay informed about the latest digital rights issues, threats, and community resources

OpenAI has taken a significant leap in the cybersecurity field by unveiling GPT-5.4-Cyber, a variant of its renowned language model specifically engineered to tackle cyber threats. As digital threats evolve, so does the technology to combat them, and GPT-5.4-Cyber emerges as a promising tool for cybersecurity professionals. This advanced AI model is designed to identify, analyze, and mitigate a variety of cyber threats in real-time. Unlike its predecessors, GPT-5.4-Cyber is enriched with capabilities that allow it to scrutinize and comprehend extensive datasets of threat intelligence, offering proactive defense strategies against evolving threats. Initially, OpenAI is providing restricted access to security experts for testing and feedback, ensuring its readiness before broader deployment. The aim is to equip organizations with a robust AI-driven framework that enhances existing cybersecurity measures, potentially redefining industry standards. However, the public release of GPT-5.4-Cyber is under evaluation, considering the potential risks and misuse of such a powerful tool. This decision highlights OpenAI's commitment to ethical AI deployment and the balance between technological advancement and security concerns. Despite limited availability, the introduction of GPT-5.4-Cyber marks a transformative step in AI-enhanced security, signifying a potent ally against cyber criminals and offering a glimpse into the future of digital security frameworks.

The Nigerian government is set to reinforce its digital landscape by establishing a National Cybersecurity Coordination Council. This initiative aims to safeguard the booming digital economy from the ever-looming threat of cyber-attacks. As Nigeria's digital economy continues to expand, driven by an increase in digital transactions, e-commerce, and the growing number of internet users, the need for robust cybersecurity measures has never been more crucial. The proposed Council will serve as a central coordination body designed to facilitate cross-sector collaboration between government ministries, agencies, the private sector, and international partners. By doing so, it seeks to develop cohesive strategies and policies that not only address current threats but also anticipate future challenges. It demonstrates Nigeria's commitment to securing its digital assets and fortifying its cyberspace within the global sphere. The Council's establishment will likely involve creating frameworks for monitoring cyber threats, enhancing incident response protocols, and fostering a culture of cybersecurity awareness among businesses and citizens. As digital dependency increases, protecting citizens' data privacy and ensuring the resilience of digital infrastructures against attacks becomes imperative. With this initiative, the Nigerian government is taking a proactive approach, acknowledging that a secure digital environment is foundational for economic growth and investment attraction in the digital sector.

In today's rapidly evolving digital landscape, Security Operations Center (SOC) analysts play a crucial role in safeguarding organizational assets from a myriad of cyber threats. With cyberattacks becoming increasingly sophisticated, the pressure on SOC analysts to detect, respond, and mitigate incidents in real-time is immense. Unfortunately, this high-stress environment often leads to burnout, which not only affects the mental and physical well-being of these experts but also diminishes their effectiveness. Burned-out security analysts tend to overlook significant threat indicators, experience longer response times during investigations, and are more prone to leaving their positions, thereby further straining resources and amplifying risks. To mitigate this, Chief Information Security Officers (CISOs) need to prioritize improving the SOC analyst experience. This can be achieved by implementing a supportive work environment equipped with the latest technology and tools that streamline and automate routine processes, allowing analysts to focus on more complex decision-making tasks. Moreover, fostering an inclusive culture that emphasizes teamwork, continuous professional development, and recognizes achievements can enhance job satisfaction and retention. Enhancing the SOC experience not only improves individual analyst performance but optimizes the entire security posture of an organization, ensuring a proactive approach to threat management and safeguarding sensitive data against ever-evolving cyber threats.
Join us in defending digital rights and protecting vulnerable communities.
Get in touch to discuss your needs or how you can support our mission
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.