Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    MEDIUM (6.3)
    Plugin

    Cross-Site Request Forgery in Conditional Menus Plugin

    Published Date: Mar 26, 2026

    The Conditional Menus plugin for WordPress is affected by a Cross-Site Request Forgery (CSRF) vulnerability. This flaw allows attackers to alter conditional menu configurations when an administrator is tricked into executing a forged request.

    MEDIUM (5.8)
    Plugin

    Unauthorized Data Overwriting via REST Route in LeadConnector Plugin

    Published Date: Mar 26, 2026

    The LeadConnector plugin for WordPress before version 3.0.22 lacks proper authorization on a REST API route. This allows unauthenticated users to manipulate and potentially overwrite existing data through unauthorized API calls.

    MEDIUM (5.2)
    Plugin

    Stored Cross-Site Scripting in WP Lightbox 2 Plugin

    Published Date: Mar 26, 2026

    The WP Lightbox 2 plugin for WordPress, prior to version 3.0.7, contains a vulnerability that allows high privilege users, such as administrators, to inject malicious scripts by not properly sanitizing and escaping certain settings. This can lead to a Stored Cross-Site Scripting (XSS) attack, even when the unfiltered_html capability is restricted, such as in a multisite configuration.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    Apple says no one using Lockdown Mode has been hacked with spyware
    March 27, 2026

    Apple says no one using Lockdown Mode has been hacked with spyware

    In a bold assertion, Apple has declared that its Lockdown Mode, a security feature on its devices, has successfully thwarted all known attempts by spyware to infiltrate systems equipped with the mode. This statement comes in the wake of growing concerns about spyware's ability to exploit vulnerabilities in older software versions. Designed specifically to protect high-risk users, such as journalists and activists from sophisticated cyber threats, Lockdown Mode introduces a suite of advanced security measures. These include restricting certain functions and minimizing attack vectors available to spyware. The company remains steadfast in its dedication to enhancing digital security by affirming that no device running Lockdown Mode has succumbed to successful spyware intrusion. This revelation underscores the importance of keeping devices updated, utilizing advanced security features, and the continuous evolution of security protocols to guard against emerging threats. As cyber threats continue to evolve, businesses and individual users alike must stay informed and leverage cutting-edge technology to protect sensitive data. Apple’s proactive approach exemplifies the tech industry's broader responsibility to develop robust defenses that anticipate and neutralize threats before they can compromise user safety. With this assurance of Lockdown Mode's efficacy, Apple reinforces its position as a leader in digital security, providing users with peace of mind amid the ever-present threat of cyber espionage.

    The Credentialed Ghost: Why 2026’s Biggest Breaches Won’t Trigger Your Alarms
    March 27, 2026

    The Credentialed Ghost: Why 2026’s Biggest Breaches Won’t Trigger Your Alarms

    As we navigate the complexities of cybersecurity in 2026, an unsettling truth has emerged: the collapse of trust in identity as a reliable security boundary. The advent of 'The Credentialed Ghost' phenomenon marks a significant turning point in how enterprises approach security. For decades, the cybersecurity playbook has focused on distinguishing between the 'in' and 'out'; essentially defending the internal trust perimeter against external threats. However, as threat vectors evolve, bad actors are getting smarter, exploiting what was once considered the cornerstone of digital security: identity. These sophisticated attackers have honed techniques to manipulate credentials and traverse seamlessly within organizational networks, often unnoticed by traditional security alarms. This scenario is exacerbated by the universal adoption of passwordless authentication methods and the increased reliance on biometrics and multi-factor authentication (MFA). While these techniques have successfully reduced the risk of password-based attacks, they have inadvertently shifted the threat landscape to identity misuse and insider threats. As more organizations adopt cloud services and remote work arrangements become the norm, the boundaries of the enterprise network are blurring, leaving a greater surface area vulnerable to identity-based exploits. The focus for cybersecurity practitioners must now shift from merely defending perimeters to enhancing detection and response capabilities that can identify malicious activity even when credentials appear legitimate. This not only calls for advanced threat intelligence but also a pivot towards a zero-trust security model where no user credentials are implicitly trusted. The 'Credentialed Ghost' represents a new era of breaches, underlining the need for heightened vigilance, continuous monitoring, and adaptive risk management strategies that anticipate and mitigate risks in real-time.

    Safeguarding against external intrusions utilizing adaptive bio-inspired multi-population anomaly detection for IoT network
    March 27, 2026

    Safeguarding against external intrusions utilizing adaptive bio-inspired multi-population anomaly detection for IoT network

    As the Internet of Things (IoT) continues to grow at an unprecedented pace, so does the challenge of securing these countless nodes within a network against sophisticated cyber threats. Traditional security measures, which often focus on signature-based detection, are proving inadequate against the dynamic and complex nature of modern cyberattacks. In response, researchers are turning towards adaptive bio-inspired strategies for network security. This approach borrows concepts from natural systems, leveraging the adaptability and resilience found in biological populations to enhance security measures across IoT networks. By implementing multi-population anomaly detection systems, the technique aims to identify and counteract anomalies that suggest potential intrusions or malicious behaviors in real-time. This kind of adaptive security is not only about protecting data integrity but also about maintaining the real-time operational capabilities that IoT networks require. For instance, an anomaly detection system inspired by natural selection could dynamically adapt to detect zero-day attacks, which are previously unknown threats that exploit new vulnerabilities. The innovative aspect of bio-inspired models is their ability to evolve, much like biological organisms, to understand and mitigate new threats through self-adjustment and learning. Consequently, these models promise more robust protection for IoT systems, thereby reducing the risk of widespread disruption caused by cyberattacks.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More