top of page

Individuals

Individuals

Have I Been Pwned

Check if your email has been involved in a data breach.

haveibeenpwned.com

Download guide

Authy

App for two-factor authentication to protect online accounts.

authy.com

Bitwarden

Free password manager for secure storage.

bitwarden.com

Malwarebytes

Free malware protection and scanner.

malwarebytes.com

Civil Society Organizations (CSOs)

CSOs

Tails

Portable OS that provides secure, anonymous communications.

tails.boum.org

Tor Browser

Privacy-focused web browser for secure, anonymous browsing.

torproject.org

Signal

Encrypted messaging app for secure communication.

signal.org

Tella

App for securely documenting evidence.

tella-app.org

ProtonMail

Encrypted email service with high privacy standards.

protonmail.com

Independent Media

Media

CrowdSec

Collaborative, open-source protection tool for real-time threat detection and reporting.

crowdsec.net

SecureDrop

Open-source tool for securely receiving documents from anonymous sources, ideal for journalists.

securedrop.org

Matomo

Privacy-oriented analytics tool for tracking website engagement securely.

matomo.org

Tella

App for securely documenting evidence.

tella-app.org

Cloudflare DDoS

Free DDoS protection to shield websites from online attacks.

cloudflare.com

Guide for Digital Security

Small and Medium Enterprises (SMEs)

SMEs

Cyber Essentials

Framework from UK NCSC covering essential cybersecurity measures.

ncsc.gov.uk/cyberessentials

Qualys Community

Free vulnerability scanning for small businesses.

qualys.com

CIS Controls

Best practices guide from the Center for Internet Security to protect against common threats.

cisecurity.org

VPN - NordVPN

Reliable VPN service with high privacy standards.

nordvpn.com

OpenVAS

Open-source network vulnerability scanner for security assessments.

greenbone.net

Cybersec i IR teams

Guides

Battle Cards

CSEC Battle Cards are a free resource to help your cybersecurity team to protect your data and defend against potential cyber attacks.


www.csec.ba/battle-cards

TheHive

Open-source incident response platform for collaborative investigation and tracking of incidents.


thehive-project.org

Cuckoo Sandbox

Open-source automated malware analysis system that helps identify and understand malware behavior.


cuckoosandbox.org

E-signature

E-signature in Bosnia and Herzegovina

Read article

DDoS

DDoS Attacks prevention


Download guide

MISP

Open-source threat intelligence platform for sharing, storing, and correlating Indicators of Compromise (IOCs) for threat analysis.


misp-project.org

YARA

Tool for identifying and classifying malware by creating rules to recognize patterns in binary files.


virustotal.github.io/yara

Mikrotik

Mikrotik devices hardening

Download guide

Velociraptor

Endpoint visibility tool focused on incident response, hunting, and forensic analysis, useful for detecting and responding to threats.


docs.velociraptor.app

Intrusions&Impacts

Reinventing Cyber-Security Training

START

bottom of page