The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday announced that it has compiled a list of free cybersecurity tools and services that can help organizations reduce risk and improve resilience.
The list includes open source tools and free resources provided by various private companies and government organizations. CISA plans on continuously updating the list and it will also create a process for third-parties to submit other resources for inclusion.
The tools and services focus on helping organizations reduce the likelihood of a damaging cyber incident, quickly detect malicious activity, respond to incidents, and maximize resilience.
The list currently includes roughly 100 tools and services, including ones offered by CISA, Microsoft, Google, Cloudflare, Cisco, Center for Internet Security, CrowdStrike, Tenable, AT&T Cybersecurity, IBM, Mandiant, Splunk, VMware, SANS, Secureworks, and Palo Alto Networks. Twenty-five are open source tools not linked to vendors.
CISA noted that it does not endorse any commercial product or service, and it does “not attest to the suitability or effectiveness of these services and tools for any particular use case.”
The agency has advised organizations — before turning to the free tools and services — to fix known high-risk vulnerabilities, implement multifactor authentication, replace unsupported products, and reduce their internet attack surface. Organizations can also sign up for CISA’s Cyber Hygiene Vulnerability Scanning, which involves vulnerability scans and the delivery of weekly reports.
CISA also maintains a list of more than 370 vulnerabilities that are known to have been exploited in attacks. Federal agencies are required to fix these flaws within defined timeframes, but other organizations are also advised to use the list to prioritize patching.
Related: CISA’s ‘Must Patch’ List Puts Spotlight on Vulnerability Management Processes
Related: CISA Says ‘HiveNightmare’ Windows Vulnerability Exploited in Attacks
Related: CISA Again Warns U.S. Organizations of Potential Russian Cyberattacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
