We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.
How we work to protect digital rights and empower communities
Raising awareness about digital rights, privacy threats, and security best practices.
Advocating for policies and regulations that protect digital rights and freedoms.
Providing training and resources on digital security for vulnerable groups.
Offering direct assistance to individuals and organizations facing digital threats.
Creating networks of digital rights defenders to share knowledge and resources.
Working with partners globally to develop solutions to digital security challenges.
Real-time visualization of digital rights violations and security threats worldwide
Stay informed about the latest digital rights issues, threats, and community resources

Hospitals utilizing electronic health records (EHR) face numerous challenges in ensuring the security and privacy of sensitive patient information. As cyber threats continue to evolve, safeguarding these records requires a comprehensive security strategy. Experts emphasize several key approaches to protecting electronic health records. Firstly, encryption is crucial; it renders data unreadable to unauthorized users, thereby protecting it from breaches, especially during data transmission. Hospitals must implement robust encryption protocols for both data at rest and data in transit. Regular security audits are equally important. These audits help identify vulnerabilities in hospital networks and EHR systems, ensuring timely updates and patches can be applied to mitigate risks. Staff training on cyber hygiene is another important component of data security. Healthcare staff are often the weakest link in cybersecurity defenses. Frequent training sessions on recognizing phishing attempts and adhering to strong password protocols can reduce the risk of data breaches caused by human error. Furthermore, multi-factor authentication adds another layer of security, making unauthorized access to hospital systems more challenging for cybercriminals. By adopting these strategies, hospitals can better protect sensitive patient information from cyber threats, ensuring compliance with regulations like HIPAA and maintaining patient trust.

In a recent cyber event highlighting the significant risks of software supply chain vulnerabilities, the AppsFlyer Web SDK was temporarily hijacked by malicious actors deploying cryptocurrency-stealing JavaScript code. This incident underscores the growing sophistication and audacity of supply chain attacks, where cybercriminals compromise widely-used development tools and infrastructure to distribute malware. The attack was launched via a malicious update to the AppsFlyer SDK, which injected code aiming to siphon off cryptocurrency transactions. As AppsFlyer's Web SDK is instrumental in enabling developers to engage in user analytics and marketing metrics, the breach has broad implications, potentially affecting a wide range of businesses that rely on the SDK for their web operations. This kind of attack reveals the inherent vulnerability in third-party software components and highlights the importance of rigorous security audits, real-time monitoring, and enhanced defenses for software supply chains. The impact is far-reaching, as compromised systems can lead to significant financial losses and data breaches. Developers and organizations using the Web SDK need to be on high alert and implement quick remediation measures to prevent further exploitation. The attack also serves as a cautionary tale for the tech industry, stressing the necessity for companies to establish robust security controls, utilize tools to detect unusual activities quickly, and maintain stringent backup and incident response plans.

In a significant cybersecurity event, a group of hackers believed to be linked to Iran has reportedly targeted Stryker, a well-known US medical technology company. The attack involved the use of sophisticated cyber weaponry to breach Microsoft systems and wipe devices, a tactic that signifies a worrisome escalation in cyber warfare. Such incidents underscore the critical vulnerabilities present in the healthcare sector, which holds vast amounts of sensitive data. The perpetrators are thought to be state-sponsored, and their motives might extend beyond financial gain, potentially aiming to disrupt the technological infrastructure of vital industries. The healthcare sector has become an increasingly attractive target for cybercriminals due to the sensitive nature of its data and the life-and-death scenarios that depend on its operational integrity. This attack could have far-reaching impacts, not only jeopardizing patient data and privacy but also potentially affecting the operational capabilities of medical technology that are crucial for day-to-day healthcare provision. It is imperative for organizations, especially those in critical sectors like healthcare, to reinforce their cybersecurity frameworks to protect against such advanced persistent threats (APTs). This includes implementing robust incident response plans, enhancing network security measures, and ensuring that all systems are regularly updated and patched to counter known vulnerabilities.
Join us in defending digital rights and protecting vulnerable communities.
Get in touch to discuss your needs or how you can support our mission
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.