Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Global Digital Threats Monitor

    Real-time visualization of digital rights violations and security threats worldwide

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    CISA, FBI have engaged with Stryker staff after cyberattack, official says
    March 17, 2026

    CISA, FBI have engaged with Stryker staff after cyberattack, official says

    Following a significant cyberattack on Stryker Corporation, a leading global medical technology company, U.S. cybersecurity regulatory bodies, including the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), have been actively engaging with Stryker's staff to mitigate the repercussions and bolster their digital defenses. The incident underscores a persistent cybersecurity threat landscape that is gradually evolving with nation-state threat actors such as those linked to Iran. CISA's Nick Andersen highlighted the 'steady state' of hacking activities associated with Iran, reiterating the importance for all organizations, especially in critical sectors like healthcare, to remain vigilant and enhance their cybersecurity measures. The cyberattack on Stryker serves as a stark reminder of the vulnerabilities that persist in today’s digital environment. This event also accentuates the need for improved real-time threat detection and response mechanisms, urging companies to invest in robust security frameworks and engage in continuous cybersecurity training. As digital assaults become more sophisticated, collaboration between private companies and governmental agencies becomes imperative to safeguard sensitive data and ensure business continuity. It is crucial for organizations to not only rely on compliance standards but to create adaptive, dynamic defense strategies tailored to their unique threat environments.

    Operation Epic Fury: Why exposure data changes everything about Iran's cyber-kinetic campaign
    March 17, 2026

    Operation Epic Fury: Why exposure data changes everything about Iran's cyber-kinetic campaign

    Operation Epic Fury marks a paradigm shift in the nature of conflict between state actors, emphasizing the intersection of cyber and kinetic warfare. Iran's campaign, ostensibly in retaliation to Operation Epic Fury, showcases the emerging reality where cyber operations can have profound physical effects. This blend of digital and physical warfare signals a new era in security challenges. Throughout the campaign, exposure data from Tenable has spotlighted vulnerabilities across a wide spectrum of crucial infrastructure in seven targeted countries, revealing the depth and complexity of the attack vectors utilized. The analysis of this exposure data uncovers that the most significant vulnerabilities lie not in spectacular headline acts but in mundane, often overlooked systems that, when breached, can lead to massive disruptive potential. The integration of cyber warfare with physical retaliations has added layers of unpredictability in global security dynamics, underscoring the importance of robust cybersecurity measures. For businesses and governments alike, this campaign stresses the urgent need for dynamic vulnerability management and proactive cybersecurity strategies. As cyber threats evolve, ensuring comprehensive security protocols that encompass both digital and physical spaces is critical. This situation emphasizes the dire consequences of neglecting cyber hygiene and reinforces the importance of constant vigilance against vulnerabilities within even the least expected systems.

    Vibe Coding Plugins? Validate With Official WordPress Plugin Checker via @sejournal, @martinibuster
    March 17, 2026

    Vibe Coding Plugins? Validate With Official WordPress Plugin Checker via @sejournal, @martinibuster

    The official WordPress Plugin Checker has emerged as an invaluable tool for all WordPress website owners, especially those using or considering using plugins with custom coding—often labeled as vibe coded plugins. This tool conducts an automated code review, focusing on security standards and best practices, thus assisting developers and website administrators in ensuring their plugins adhere to the highest security protocols and coding standards. Plugins are integral to WordPress functionalities, yet they also pose significant security risks if not properly vetted and maintained. The Plugin Checker aims to mitigate these risks by analyzing plugin codes for vulnerabilities that could be exploited by malicious actors. It inspects for common security loopholes such as CSRF, XSS, SQL injection, and more, providing detailed insights and recommendations for any issues found. Moreover, by identifying practices that might compromise website performance, the tool not only safeguards against cyber threats but also enhances the overall user experience by ensuring efficient and optimized plugin operations. This development is particularly beneficial for plugin developers striving to meet WordPress’s robust standards for safety and quality. Overall, the WordPress Plugin Checker is an essential asset for maintaining the security integrity of a WordPress ecosystem, empowering developers and users to create and maintain secure, trustworthy websites.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More