Beyond the known

Our team works tirelessly to enable you to stay ahead of emerging cyber threats with cutting-edge tools and intelligence.

We'll notify you when your membership is ready.

What is TLP:Black?

TLP (Traffic Light Protocol) is used in cybersecurity to control information sharing. Color codes show how widely the information can be distributed.

TLP Green

TLP:Green

Information classified as TLP:Green can be shared within the community but not publicly.

TLP Green

TLP:Amber

Information classified as TLP:Amber should only be shared with specific individuals within an organization, not for public distribution.

TLP Green

TLP:Red

Information classified as TLP:Red is highly sensitive and should not be shared further after it is received, even within the organization.

TLP Green

TLP:Black

Information classified as TLP:Black has never existed. Nobody has ever heard of it, there is no TLP:Black class. Move along.

Advisory Board

Our wisdom and guidance comes from the best in the field

J

Juan Andrés Guerrero-Saade

@juanandres_gs

Juan Andrés Guerrero-Saade is Senior Technical Fellow (Research & Innovation) at SentinelOne and an Adjunct Professor at Johns Hopkins SAIS Alperovitch Institute. 'JAGS' was Chronicle Security's Research Tsar, co-founder of Stairwell, Principal Security Researcher at GReAT, and worked as a Senior Security Advisor to the Government of Ecuador. His joint work on Moonlight Maze is now featured in the International Spy Museum's permanent exhibit in Washington, DC.

R

Ryan Naraine

@ryanaraine

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

V

Vitaly Kamluk

@vkamluk

Vitaly Kamluk spent 20+ years in infosec and is the founder of TitanHex in Singapore. He previously served as Director of the APAC GReAT, worked as a cybersecurity expert at INTERPOL, authored the open-source forensic toolkit Bitscout, and holds a patent for a malware similarity search algorithm. A frequent speaker, coach, and review board member at major infosec events, he is passionate about malware analysis, forensics, cryptography, privacy, and hardware hacking.

M

Marco Preuss

@marco_preuss

Marco Preuß is a cybersecurity strategist with more than two decades of experience in infosec. He spent 18+ years in the antimalware industry, stepping up his career up to Director of the European GReAT.

Marco’s interests lie in the study of Darknet ecosystems, password vulnerabilities, IoT security, and OSINT, as well as in deploying honeypots to track and analyze cybercrime.

Solutions

Our platform provides a comprehensive suite of tools for cybersecurity research, response, and proactive hunting.

Passive DNS

Our comprehensive Passive DNS database provides historical and carefully tagged records for threat intelligence. Our competitive advantage is the focus on malicious domains and networks, ensuring our data is relevant and actionable.

app.tlpblack.net

Indicators of Compromise

Access a rich database of network indicators of compromise. Ingest into your SIEM or SOAR for proactive threat detection and response.

We've got a new detection from TLPBLACK
Bruce W.
Yep, appears Lazarus is back in the game on our fields.
Found them, hold my beer!
Chuck N.

YARA Quality Lab

Develop, test, and refine your YARA rules in a secure virtual lab environment with access to a wide range of malware samples. Boost your threat detection capabilities.

bad.yara

good.yara

rule bad_rule {
    condition:
        hash.md5(0, filesize) == "deadbeefdeadbeefdeadbeefdeadbeef" or
        hash.md5(0, filesize) == "00c0ffeec0ffeec0ffeec0ffeec0ffee" or
        hash.md5(0, filesize) == "3af647e56fa15e3ef2894856e9a4c58e"
}
rule unk_liblzma_ed448key {
  meta:
    description = "liblzma backdoor, attacker ed448 public key"
    hash = "cbeef92e67bf41ca9c015557d81f39adaba67ca9fb3574139754999030b83537"
    ...
  strings:
    $a1 = {
      0a 31 fd 3b 2f 1f c6 92 92 68 32 52 c8 c1 ac 28
      34 d1 f2 c9 75 c4 76 5e b1 f6 88 58 88 93 3e 48
  } ...
  condition:
    (uint32be(0) == 0x7F454C46)  and  (filesize < 5MB)  and  (any of them)
}

C2 Monitor

Track and analyze command-and-control (C2) servers for selected campaigns. We use indirect fingerprinting and other advanced techniques to stay below the radar.

app.tlpblack.net

Nightfall

Monitor your country's C2 infrastructure in real-time anywhere, anytime from your desktop or smartphone.

Feeds

Bring our threat intelligence to your security systems and workflows.

Network IOCs

Automatically generated latest network indicators of compromise (IOCs) feed, consisting of tagged malicious IPs and domains. Easily ingest into your SIEM, SOAR, or threat intelligence platform for enhanced detection and response.

Radar logo

IP Range Reputation

A curated IP range reputation feed, providing insights into the trustworthiness of IP blocks. Integrate this data into your security systems to enhance threat detection and risk assessment.

logo

YARA Rules

Our in-house developed YARA rules for threat detection. Created by expert researchers to identify and classify malware effectively, tested against a wide range of samples and clean files for false positive minimization.

TLPBLACK.yara

|

Webcrawler Samples

Daily updated feed of malware samples collected via our webcrawler. Stay ahead of emerging threats with fresh samples for analysis and detection development.

Honeypot Samples

Fresh malware samples captured from our global network of honeypots. Gain insights into attacker techniques and emerging threats with real-world data for analysis and defense enhancement.

Facts & Figures

We take pride in the technology we create and the infrastructure we support.

Uptime guarantee
99.99%
We ensure maximum availability of our servers
Years of Experience
100+
Team-combined expertise in cybersecurity
Active indicators
300K+
Tracking and analyzing threats in real-time
Timezone coverage
24/7
All global regions for continuous support

Trainings

Enhance your skills with our expert-led cybersecurity trainings.

Malware Analysis

In this course, you'll explore both dynamic and static approaches to dissecting malware, and learn the tools and platforms used for deep malware inspection. At the core of the training we have placed reverse-engineering, which is essential for a thorough understanding of malicious intent and various conditions.

Course duration: 2-4 days
Technical Level: ●●●●●
Minimum Audience: 10 pax

YARA Threat Hunting

Learn to write effective YARA rules for threat hunting. This training covers YARA syntax, best practices, and advanced techniques for creating robust rules to identify and classify malware.

Course duration: 2 days
Technical Level: ●●●○○
Minimum Audience: 10 pax

iOS Forensics

This course focuses on the challenge of examining Apple's proprietary iOS ecosystem, a common target for sophisticated, high-stakes cyberattacks. You'll learn foundational iOS security principles, the practical constraints forensic investigators face, and the step-by-step methods and tools for extracting data in fully authorized forensic engagements.

Course duration: 2 days
Technical Level: ●●●○○
Minimum Audience: 10 pax

OPSEC for High-Risk Targets

This is a comprehensive hands-on training tailored for VIP clients, targeted individuals and government personnel operating in high-risk environments. Participants will learn about enhanced cybersecurity protocols of various complexity levels, from fundamental safeguards to advanced protection strategies. The curriculum develops thorough security awareness and implementable countermeasures across digital infrastructure, physical environments, and behavioral domains - including defense against psychological operations (PsyOps) campaigns.

Course duration: 2 days
Technical Level: ●●●○○
Minimum Audience: 10 pax

Remote Forensics

In this segment, you'll get hands-on with our state-of-the-art remote digital forensics platform—already deployed across countless law-enforcement cases and private-sector threat-intelligence projects. Engineered for lightning-fast performance and rich functionality by hundreds of open-source cyberforensics contributors, this free toolkit still requires expert mentorship to unlock its full potential. Who better to guide you than the very developers behind it?

Course duration: 2-4 days
Technical Level: ●●●●●
Minimum Audience: 10 pax

Frequently Asked Questions

Services

Our expert services to support your cybersecurity needs.

Dark Markets Monitoring

We process hundreds of gigabytes of new compromised credentials available on the underground markets and help you identify those which are linked to your organization.

Document Viewer

Investigation Support

Our expert analysts provide comprehensive support for cyberattack investigations, including malware analysis, threat actor attribution, and incident response guidance.

Strategic Advisory

We offer high-level advisory and consulting services to help organizations develop and implement effective cybersecurity strategies tailored to their unique needs and risk profiles.

Threat Hunting

Our team conducts focused threat hunting operations to identify and mitigate threats from selected threat actors, leveraging advanced techniques and tools to uncover hidden risks.

Malware Analysis

Our malware analysis services include reverse engineering, dynamic analysis, and malware attribution to help you understand and mitigate threats effectively.

Our Mission

To redefine threat intelligence for the next generation — where machines accelerate discovery and humans guarantee quality.

Get started

Ready to try something new?

Get started with our platform today and get access to the TLPBLACK information.