Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Global Digital Threats Monitor

    Real-time visualization of digital rights violations and security threats worldwide

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    Stryker Cyberattack Update: Stryker Hit by Suspected Iran-Linked Cyberattack Causing Global Network Outage
    March 11, 2026

    Stryker Cyberattack Update: Stryker Hit by Suspected Iran-Linked Cyberattack Causing Global Network Outage

    Stryker Corp., a leader in the medical technology sector, has announced a severe disruption across its global network due to a cyberattack. This breach targeted its Microsoft environment, which has been pivotal in operating and managing various aspects of its digital infrastructure. The reports suggest that the attack is linked to an Iran-based hacking group, known for its sophisticated cyber intrusion techniques. The global outage has raised significant concerns among cybersecurity experts and stakeholders due to the critical nature of data associated with medical technologies. Moreover, such attacks emphasize the high stakes involved when essential healthcare systems and their supporting IT infrastructures are jeopardized. Companies in the medical and healthcare sectors are on high alert due to the sensitive nature of their data, which includes confidential patient information, medical device operations, and proprietary research. This incident highlights the pressing need for robust cybersecurity frameworks, especially when dealing with international threats. The Stryker attack could prompt others in the sector to fortify their defenses to prevent similar occurrences and protect against potential future breaches. It underscores the necessity of having strong cybersecurity strategies, including regular vulnerability assessments, employee cybersecurity training, and incident response planning, to mitigate risks and safeguard operational continuity across all digital platforms.

    Iran-linked hackers hit medical giant Stryker in retaliatory cyberattack
    March 11, 2026

    Iran-linked hackers hit medical giant Stryker in retaliatory cyberattack

    In a significant escalation of cyber hostilities, a hacker group allegedly linked to Iran has targeted Stryker, a major player in the global medical technology industry. This breach comes as a response to what the group describes as 'deadly US-Israeli strikes on an Iranian school,' highlighting the intertwined nature of geopolitics and cybersecurity threats. The attackers claim to have exfiltrated a colossal 50 terabytes of sensitive data from Stryker's databases, which reportedly includes proprietary medical technology information, personal information of employees, and possibly sensitive client data that could have far-reaching implications. The incident underscores the growing trend of state-affiliated cyber campaigns seeking to leverage data thefts as a form of asymmetric warfare. With healthcare and associated fields becoming frequent targets, this event raises alarms within industries that are already vulnerable due to their critical nature. Stryker, like many healthcare organizations, holds vast amounts of sensitive patient and proprietary data, making it an attractive target for malicious actors. This breach brings to light the urgent need for robust cyber defense mechanisms, particularly in sectors that deal with sensitive information. It further highlights how geopolitical tensions can spill over into the digital realm, affecting businesses far removed from the immediate area of conflict. As ransomware, data exfiltration, and other forms of cyberattacks become more common, organizations are urged to revisit and strengthen their cybersecurity postures. Moreover, this scenario serves as a sober reminder to enterprises and stakeholders worldwide of the interconnectedness of global infrastructure and the potential ramifications of negligence in cybersecurity preparedness.

    Cyber Retaliation: Analyzing Iranian Cyber Activity Following Operation Epic Fury
    March 11, 2026

    Cyber Retaliation: Analyzing Iranian Cyber Activity Following Operation Epic Fury

    In the immediate aftermath of Operation Epic Fury, the landscape of cyber warfare has rapidly escalated, particularly with Iranian cyber activities shifting gears. Traditionally known for conducting covert espionage operations, Iranian cyber actors have now turned their focus towards overt and highly coordinated actions aimed at inflicting economic damage and executing physical retaliation. This shift underscores a significant escalation, moving from quiet digital intrusions to aggressive cyber offenses that affect both governmental and private sectors globally. The Tenable Research Special Operations (RSO) team has subsequently prioritized the study of these emerging threats. Their analysis reveals that Iranian cyber actors are leveraging state-sponsored resources to engage in a spectrum of cyber threats ranging from Distributed Denial of Service (DDoS) attacks to more sophisticated infrastructure-targeting exploits. Such activities aim at creating economic turbulence and undermining geopolitical adversaries through digital means. For organizations, particularly those with digital infrastructures or dependencies, it's essential to recognize this evolving threat landscape and adopt fortified cybersecurity measures. This adaptation will include enhanced vigilance in monitoring potential intrusion attempts and bolstering digital defenses to mitigate economic losses and operational downtimes caused by Iran's cyber offensives. As these activities appear to be state-sponsored or endorsed, the threats are expected to be persistent, strategic, and capable of inflicting substantial damage if unmitigated. Cybersecurity experts emphasize the urgency for businesses to invest in security protocols that can withstand these waves of cyber offensives. This includes raising awareness, adopting robust security practices, and ensuring compliance with international cybersecurity standards to effectively counter these evolving threats.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More