Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    MEDIUM (5.9)
    Plugin

    Cross-Site Request Forgery in Advanced Contact Form 7 DB Plugin

    Published Date: Apr 8, 2026

    The Advanced Contact Form 7 DB plugin is susceptible to Cross-Site Request Forgery (CSRF) vulnerabilities in versions up to and including 2.0.9. This flaw allows unauthenticated attackers to potentially manipulate form entries by deceiving a site administrator into executing specific actions.

    MEDIUM (6.6)
    Plugin

    Unauthorized Data Access in Advanced Contact Form 7 DB Plugin

    Published Date: Apr 8, 2026

    The Advanced Contact Form 7 DB plugin up to version 2.0.9 allows unauthorized data exports due to insufficient user permission checks. Authenticated attackers with Subscriber-level access can exploit this flaw to export form submissions.

    MEDIUM (6.3)
    Plugin

    Arbitrary File Upload Vulnerability in Ninja Forms - File Uploads Plugin

    Published Date: Apr 7, 2026

    The Ninja Forms - File Uploads plugin for WordPress is affected by a vulnerability that allows arbitrary file uploads, which can lead to remote code execution. This flaw is present due to the lack of file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function, impacting versions up to 3.3.26.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    ETtech Explainer: Why Anthropic’s new AI model Mythos is a moment of reckoning
    April 9, 2026

    ETtech Explainer: Why Anthropic’s new AI model Mythos is a moment of reckoning

    Anthropic's newly unveiled AI model, Mythos, represents a significant advancement at the intersection of artificial intelligence and cybersecurity. Specifically designed to identify critical security vulnerabilities, Mythos has the astonishing capability to discovery flaws, some of which have been lurking unnoticed for decades. The profound impact of such technology could revolutionize digital security frameworks across the globe by preemptively addressing these vulnerabilities before they are exploited by malicious entities. However, with great power comes great responsibility, and the possibilities of its misuse have led to Anthropic's decision to hold back a public release. Instead, the standout AI model is currently being evaluated by a selected group of around 40 companies, including tech giants, who are assessing it for wider private deployment. These companies' early involvement aims to harness Mythos's capabilities to patch vulnerabilities and safeguard systems against future threats proactively. The closed testing phase presents a strategic move to strike a balance between unleashing machine learning's potential for safeguarding digital infrastructures while also curbing chances of adversarial manipulation. As the landscape of threats evolves, tools like Mythos could become essential elements in the comprehensive arsenal required for robust digital security.

    BlueHammer: Windows zero-day exploit leaked
    April 8, 2026

    BlueHammer: Windows zero-day exploit leaked

    In recent cybersecurity news, an alarming zero-day vulnerability, dubbed BlueHammer, has surfaced, targeting Windows systems. The exploit allows attackers to gain elevated privileges on a host machine, potentially leading to full system compromise. This proof-of-concept (PoC) exploit was released on GitHub by an individual using the pseudonyms Chaotic Eclipse and Nightmare Eclipse. Although the exploit is in an early stage and noted to be buggy, its leak on a public platform heightens the risk of it being weaponized by malicious actors. Zero-day vulnerabilities are critical because they exploit previously unknown software flaws, leaving no time for the vendor to provide a patch before attacks can occur. This revelation has rattled the cybersecurity community, as privilege escalation vulnerabilities are particularly dangerous in corporate settings where the potential for data breaches is significant. Microsoft has yet to release a patch, leaving systems exposed and users reliant on interim mitigation techniques such as disabling features exploited by the vulnerability. The incident underscores the pressing need for robust security practices and emphasizes the importance of staying informed about immediate cybersecurity threats.

    'A more secure, scalable platform that runs on modern infrastructure and supports AI-native workflows': Why Cloudflare's new EmDash is the "spiritual successor" to WordPress
    April 8, 2026

    'A more secure, scalable platform that runs on modern infrastructure and supports AI-native workflows': Why Cloudflare's new EmDash is the "spiritual successor" to WordPress

    Cloudflare's introduction of 'EmDash' marks a significant evolution in the realm of content management systems (CMS), positioning itself as a futuristic alternative to WordPress. Built with a focus on security, scalability, and AI-native workflows, EmDash is designed to address several critical needs in the modern digital landscape. Unlike traditional platforms, EmDash promises a robust infrastructure that natively integrates artificial intelligence to enhance operational efficiency and user engagement. As cyber threats evolve and become more sophisticated, EmDash aims to offer a proactive stance in ensuring that user data and content integrity are preserved against breaches. This new CMS highlights features such as automated security updates, seamless integrations with AI tools, and a modular architecture that caters to modern web development needs. Cloudflare’s EmDash is anticipated to foster a safer, more dynamic online ecosystem by providing developers and content creators with the tools necessary to build resilient digital experiences. This shift towards a more AI-integrated CMS aligns with the broader industry trend of adopting machine learning and AI to drive smarter, safer, and more effective online solutions.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More