We are a collective of digital rights advocates, security experts, and educators committed to empowering individuals and communities with the knowledge and tools to protect their digital freedoms.
How we work to protect digital rights and empower communities
Raising awareness about digital rights, privacy threats, and security best practices.
Advocating for policies and regulations that protect digital rights and freedoms.
Providing training and resources on digital security for vulnerable groups.
Offering direct assistance to individuals and organizations facing digital threats.
Creating networks of digital rights defenders to share knowledge and resources.
Working with partners globally to develop solutions to digital security challenges.
Latest WordPress security vulnerabilities affecting plugins, themes, and core.
Published Date: Mar 26, 2026
The Conditional Menus plugin for WordPress is affected by a Cross-Site Request Forgery (CSRF) vulnerability. This flaw allows attackers to alter conditional menu configurations when an administrator is tricked into executing a forged request.
Published Date: Mar 26, 2026
The LeadConnector plugin for WordPress before version 3.0.22 lacks proper authorization on a REST API route. This allows unauthenticated users to manipulate and potentially overwrite existing data through unauthorized API calls.
Published Date: Mar 26, 2026
The WP Lightbox 2 plugin for WordPress, prior to version 3.0.7, contains a vulnerability that allows high privilege users, such as administrators, to inject malicious scripts by not properly sanitizing and escaping certain settings. This can lead to a Stored Cross-Site Scripting (XSS) attack, even when the unfiltered_html capability is restricted, such as in a multisite configuration.
Stay informed about the latest digital rights issues, threats, and community resources

In a bold assertion, Apple has declared that its Lockdown Mode, a security feature on its devices, has successfully thwarted all known attempts by spyware to infiltrate systems equipped with the mode. This statement comes in the wake of growing concerns about spyware's ability to exploit vulnerabilities in older software versions. Designed specifically to protect high-risk users, such as journalists and activists from sophisticated cyber threats, Lockdown Mode introduces a suite of advanced security measures. These include restricting certain functions and minimizing attack vectors available to spyware. The company remains steadfast in its dedication to enhancing digital security by affirming that no device running Lockdown Mode has succumbed to successful spyware intrusion. This revelation underscores the importance of keeping devices updated, utilizing advanced security features, and the continuous evolution of security protocols to guard against emerging threats. As cyber threats continue to evolve, businesses and individual users alike must stay informed and leverage cutting-edge technology to protect sensitive data. Apple’s proactive approach exemplifies the tech industry's broader responsibility to develop robust defenses that anticipate and neutralize threats before they can compromise user safety. With this assurance of Lockdown Mode's efficacy, Apple reinforces its position as a leader in digital security, providing users with peace of mind amid the ever-present threat of cyber espionage.

As we navigate the complexities of cybersecurity in 2026, an unsettling truth has emerged: the collapse of trust in identity as a reliable security boundary. The advent of 'The Credentialed Ghost' phenomenon marks a significant turning point in how enterprises approach security. For decades, the cybersecurity playbook has focused on distinguishing between the 'in' and 'out'; essentially defending the internal trust perimeter against external threats. However, as threat vectors evolve, bad actors are getting smarter, exploiting what was once considered the cornerstone of digital security: identity. These sophisticated attackers have honed techniques to manipulate credentials and traverse seamlessly within organizational networks, often unnoticed by traditional security alarms. This scenario is exacerbated by the universal adoption of passwordless authentication methods and the increased reliance on biometrics and multi-factor authentication (MFA). While these techniques have successfully reduced the risk of password-based attacks, they have inadvertently shifted the threat landscape to identity misuse and insider threats. As more organizations adopt cloud services and remote work arrangements become the norm, the boundaries of the enterprise network are blurring, leaving a greater surface area vulnerable to identity-based exploits. The focus for cybersecurity practitioners must now shift from merely defending perimeters to enhancing detection and response capabilities that can identify malicious activity even when credentials appear legitimate. This not only calls for advanced threat intelligence but also a pivot towards a zero-trust security model where no user credentials are implicitly trusted. The 'Credentialed Ghost' represents a new era of breaches, underlining the need for heightened vigilance, continuous monitoring, and adaptive risk management strategies that anticipate and mitigate risks in real-time.
As the Internet of Things (IoT) continues to grow at an unprecedented pace, so does the challenge of securing these countless nodes within a network against sophisticated cyber threats. Traditional security measures, which often focus on signature-based detection, are proving inadequate against the dynamic and complex nature of modern cyberattacks. In response, researchers are turning towards adaptive bio-inspired strategies for network security. This approach borrows concepts from natural systems, leveraging the adaptability and resilience found in biological populations to enhance security measures across IoT networks. By implementing multi-population anomaly detection systems, the technique aims to identify and counteract anomalies that suggest potential intrusions or malicious behaviors in real-time. This kind of adaptive security is not only about protecting data integrity but also about maintaining the real-time operational capabilities that IoT networks require. For instance, an anomaly detection system inspired by natural selection could dynamically adapt to detect zero-day attacks, which are previously unknown threats that exploit new vulnerabilities. The innovative aspect of bio-inspired models is their ability to evolve, much like biological organisms, to understand and mitigate new threats through self-adjustment and learning. Consequently, these models promise more robust protection for IoT systems, thereby reducing the risk of widespread disruption caused by cyberattacks.
Join us in defending digital rights and protecting vulnerable communities.
Get in touch to discuss your needs or how you can support our mission
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.