Defending Your Digital Rights

    A non-profit organization committed to protecting digital freedoms, privacy, and security for vulnerable communities worldwide.

    About Us

    We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.

    Our Initiatives

    How we work to protect digital rights and empower communities

    Awareness

    Raising awareness about digital rights, privacy threats, and security best practices.

    Advocacy

    Advocating for policies and regulations that protect digital rights and freedoms.

    Education

    Providing training and resources on digital security for vulnerable groups.

    Support

    Offering direct assistance to individuals and organizations facing digital threats.

    Community Building

    Creating networks of digital rights defenders to share knowledge and resources.

    Collaboration

    Working with partners globally to develop solutions to digital security challenges.

    Global Digital Threats Monitor

    Real-time visualization of digital rights violations and security threats worldwide

    Security Alerts

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    WordPress Vulnerabilities

    Updated every hour with the latest vulnerabilities

    Latest News and Digital Rights Updates

    Stay informed about the latest digital rights issues, threats, and community resources

    pluginhunter added to PyPI
    February 27, 2026

    pluginhunter added to PyPI

    In a significant development for WordPress security, the 'pluginhunter' has been added to the Python Package Index (PyPI), offering advanced AI-powered vulnerability detection for WordPress plugins. This new tool is designed to arm developers and site administrators with robust security capabilities right at their fingertips. As more websites are built using WordPress, which powers over 40% of the global web, the security of its plugins remains a critical concern. With 'pluginhunter', users can efficiently scan their WordPress installations to detect and address potentially hazardous vulnerabilities in plugins. The innovation behind 'pluginhunter' lies in its integration of artificial intelligence algorithms. It learns from numerous data points and historical vulnerability patterns to provide accurate assessments and proactive security measures. This AI-driven approach enhances its ability to predict and identify zero-day vulnerabilities, which are often used by malicious actors to breach security defenses. Furthermore, 'pluginhunter' supports a broad range of functionalities that not only include vulnerability scanning but also reporting and updating recommendations. This makes it easier for developers to stay informed about potential security risks and to take quick action to patch their plugins or systems. Given the increasing number of cyber threats targeting WordPress platforms, this tool can be a game-changer by significantly reducing the risk surface for attacks. Site administrators can now achieve a higher level of confidence in their website's security posture, directly impacting user trust and data integrity.

    The cybersecurity market is not consolidating. It is rewiring itself
    February 27, 2026

    The cybersecurity market is not consolidating. It is rewiring itself

    The cybersecurity market is undergoing a dynamic transformation rather than simply consolidating. This shift is primarily driven by continuous innovation, the rapid adoption of artificial intelligence (AI), and an ever-evolving threat landscape that does not allow any room for complacency. While one might expect market consolidation, given the increasing number of mergers and acquisitions in the tech world, cybersecurity remains remarkably fragmented and complex. This fragmentation is not a sign of weakness but rather an indicator of the industry's adaptability. Startups and established players alike are continually developing new solutions to counter increasingly sophisticated cyber threats. AI plays a pivotal role in this evolution, empowering organizations to detect and respond to threats with unprecedented speed and accuracy. Machine learning models are being trained on vast datasets to proactively recognize patterns indicative of potential security breaches. This capability helps shift cybersecurity from a reactive posture to a more proactive one, enabling the identification of threats before they can cause harm. The diversity in cybersecurity solutions is also fueled by the unique needs of different sectors, from healthcare to financial services, each facing sector-specific challenges. This has led to specialized solutions tailored to fit varying requirements, ensuring that security strategies are bespoke rather than one-size-fits-all. For WordPress website owners, this means an ever-growing arsenal of tools and services to secure their sites. Whether protecting sensitive customer data or defending against bot-driven attacks, the capabilities available continue to advance rapidly. As threats become more complex, the playbook for defense evolves, reinforcing the necessity for site owners to remain informed and adaptable. Technology is rewiring the entire landscape, heralding a future where cyber resilience is not an option but a mandate.

    900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
    February 27, 2026

    900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

    The recent revelation by the Shadowserver Foundation has exposed a significant cybersecurity threat impacting more than 900 Sangoma FreePBX instances. These systems have been compromised with web shells, malicious scripts that allow attackers to execute commands remotely, providing unauthorized control over affected systems. The origin of this attack can be traced back to a command injection vulnerability that began in December 2025. Despite its long-standing presence, many systems remain vulnerable, signaling a critical oversight in security protocol management. Of the compromised instances, a substantial portion, numbering 401, are based in the United States, highlighting a regional concentration of the threat. This issue underscores the importance of maintaining updated security measures, since outdated patches create exploitable entry points for cybercriminals. Additionally, it demonstrates the persistent nature of certain vulnerabilities, which can be overlooked or inadequately addressed over time, leading to widespread exploitation. Organizations relying on Sangoma FreePBX for their communication needs are advised to conduct comprehensive security audits, ensuring their systems are clean and fortified against any potential intrusions. Importantly, this incident serves as a wake-up call for businesses across various sectors to reinvigorate their cybersecurity strategies and response mechanisms. It underlines the necessity of regular system monitoring and prompt application of security patches to protect assets from evolving cyber threats. Furthermore, collaboration between cybersecurity entities and affected organizations can accelerate the identification and neutralization of such attacks, minimizing damage and preventing recurrence.

    Get Involved

    Join us in defending digital rights and protecting vulnerable communities.

    Donate

    Your contribution helps us provide free security resources to those who need them most.

    Volunteer

    Contribute your skills and time to support our mission and programs.

    Partner

    Collaborate with us on initiatives that advance digital rights and security.

    Let's Work Together

    Get in touch to discuss your needs or how you can support our mission

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More