Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Global Digital Threats Monitor

    Real-time visualization of digital rights violations and security threats worldwide

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    Poor WA gov M365 security led to $71k theft and children's data breached
    March 8, 2026

    Poor WA gov M365 security led to $71k theft and children's data breached

    In a startling revelation concerning digital security practices, a state auditor has discovered a lapse in security controls within the Western Australia (WA) government's Microsoft 365 deployment. This deficiency led to a staggering $71,000 defrauding incident and jeopardized sensitive data concerning children's welfare. The breach points to inadequate security measures, such as insufficient identity verification processes and a general lack of comprehensive cybersecurity protocols within governmental departments. The state's reliance on cloud-based systems, while advantageous for operational efficiency, proved a double-edged sword due to poor implementation of security controls. This incident underscores the critical importance of robust digital security strategies, especially when dealing with cloud infrastructures like Microsoft 365. Such platforms, despite their inherent advantage in resource accessibility and collaborative efficiency, require stringent safeguarding to protect sensitive information. The audit revealed specific vulnerabilities, including inadequate multi-factor authentication and ineffective access restrictions, which were exploited to facilitate unauthorized entry and subsequent data breaches. This breach serves as a crucial reminder of the potential financial and reputational damage that can arise from insufficient security practices. The findings stress the need for continuous monitoring and updating of security protocols to defend against the ever-evolving landscape of cyber threats. As businesses and government entities increasingly transition to digital environments, this incident highlights the necessity of prioritizing cybersecurity, with an emphasis on proactive measures to protect sensitive and personal information from unauthorized access and exploitation.

    Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast
    March 8, 2026

    Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast

    In the ever-evolving landscape of cybersecurity threats, recent developments have spotlighted weaponized OAuth redirection logic as a vehicle for malware distribution. This sophisticated form of cyberattack manipulates the OAuth protocol, a widely used authorization standard, to redirect unsuspecting users to malicious sites. By exploiting vulnerabilities in OAuth redirection, attackers can seamlessly inject malicious scripts or software. This method is particularly concerning because it bypasses traditional security measures, leveraging the trust users place in reputable services that use OAuth for authentication and authorization purposes. Notably, this type of attack has not only caught the attention of cybersecurity professionals but also highlights the urgent need for secure coding practices and careful review of third-party integrations. This week's cybersecurity brief also draws attention to BlacksmithAI, an open-source, AI-powered penetration testing framework that uses a network of AI agents to simulate sophisticated cyberattacks. BlacksmithAI represents a new frontier in cybersecurity defense, providing organizations with heightened adaptability in detecting and neutralizing threats. Furthermore, this upcoming Patch Tuesday is expected to bring critical updates that address various vulnerabilities, underscoring the importance of routine software updates and patch management. As malicious actors continuously adapt and seek new avenues of attack, these updates serve as a vital line of defense, emphasizing the pivotal role of vigilance and responsive action in maintaining cybersecurity integrity.

    I was a preteen hacker. Now I protect companies from cybersecurity threats.
    March 7, 2026

    I was a preteen hacker. Now I protect companies from cybersecurity threats.

    Chaim Mazal's journey from a precocious preteen fascinated by the arts of hacking to a seasoned cybersecurity executive is both inspiring and emboldening for budding cybersecurity professionals. At a young age, Mazal’s insatiable curiosity found a home within an online hacker community. Rather than leading him down a path of cybercrime, this engagement endowed him with a deep understanding of cybersecurity's nuts and bolts. Fast forward a few years, Mazal has seamlessly transitioned from hacking for leisure to defending enterprises from the growing specter of digital threats. His unconventional path into cybersecurity challenges traditional career trajectories and highlights the value of hands-on, community-centered learning. This transformation was not just about swapping a hoodie for a suit; it signified a broader commitment to using his skills to protect sensitive data in an era where breaches are alarmingly common. Mazal's story underscores the importance of looking beyond conventional qualifications. His ability to preemptively identify and mitigate potential cyber threats makes him an invaluable asset in the current digital security landscape. As the cybersecurity environment evolves, professionals like Chaim Mazal embody a hybrid approach, blending hands-on hacking experience with formal security protocols to safeguard vital digital infrastructures. This blend of experiences has become increasingly critical as companies face more sophisticated cyber threats that require a nuanced understanding of both offensive and defensive cyber tactics.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More