Logo

Cyber Silo Threat Search Platform

Effective Date: January 1st, 2024

Terms of Service

Acceptance of Terms

  • ThreatSearch TIP is a free, open-access platform that provides actionable threat intelligence for security professionals. It helps users detect, analyze, and respond to cyber threats. The platform collects data from multiple trusted sources, offering Indicators of Compromise (IoCs), threat actor information, and timely intelligence to support better decision-making. It is easy to use and does not require registration or subscription, allowing anyone to access its resources freely.
  • These Terms of Service (TOS) define the rights and responsibilities of both ThreatSearch and its users. By using the platform, you agree to follow these terms. Accessing or using ThreatSearch means you accept this agreement in full. Users should use the platform responsibly and comply with these terms to keep the service reliable, secure, and helpful for everyone.

Definitions

ThreatSearch Platform / TIP: The ThreatSearch Threat Intelligence Platform. It provides users with access to threat intelligence data, tools, and insights to support cybersecurity activities. The platform is free and open-access, allowing anyone to explore threat intelligence resources. It is maintained and updated to provide timely and relevant information.

IoCs: Indicators of Compromise, such as IP addresses, domains, URLs, and file hashes, used to identify potential threats and suspicious activity. These indicators help users detect malicious activity in networks and systems. They are updated regularly based on new intelligence from multiple sources.

User Content: Any data, reports, or submissions provided by users of the platform. Users remain responsible for the accuracy and legality of their submissions. Submitted content may be used by ThreatSearch to improve threat intelligence and analytics. Users should ensure their submissions do not violate any laws or third-party rights.

API: Application Programming Interface that allows users to access ThreatSearch data automatically for analysis, research, or integration with other systems. The API enables faster and programmatic use of intelligence. Users must follow usage limits and avoid excessive or disruptive requests.

Integrations: Connections between ThreatSearch and other security tools or platforms that allow seamless use of threat intelligence. Integrations help users incorporate data into their existing security workflows. Proper configuration and responsible use are required to maintain platform security.

Third-Party Content: Data or threat feeds provided by external sources, which may include public or partner-supplied information. ThreatSearch does not guarantee the accuracy or completeness of third-party content. Users should verify third-party data before relying on it for security decisions.

Providing clear definitions helps users understand the terms, reduces confusion, and ensures transparency in how the platform and its data are used. It also clarifies the roles and responsibilities of both ThreatSearch and its users, helping maintain safe and effective use of the platform.

Scope of Service & Open Access

  • ThreatSearch provides a range of features to help users detect and respond to cyber threats. These include collecting threat intelligence from multiple sources, tracking Indicators of Compromise (IoCs), reporting malware, and performing analytics. The platform is completely free and can be accessed without creating an account or signing up. It is designed to be simple to use and available to anyone who needs threat intelligence.
  • The platform is intended for non-commercial purposes, research, internal security operations, and educational use. Users may not resell, redistribute commercially, or misuse the data or services. ThreatSearch monitors usage to ensure the platform remains reliable, secure, and effective for everyone.
  • Users are expected to follow these rules and use the platform responsibly. Responsible use helps maintain the accuracy, quality, and trustworthiness of the threat intelligence shared through the platform.

License & Permitted Use

  • Users are granted a limited, non-exclusive license to access and use ThreatSearch data for research, security analysis, and internal cybersecurity activities. This license also includes API access for automated queries, which must follow any specified rate limits or usage rules. All use of the platform must be responsible, lawful, and within these permitted purposes.
  • Users should ensure their activities do not harm the platform, interfere with other users, or compromise the integrity of the data. Responsible use helps maintain a safe, reliable, and consistent environment for everyone, ensuring the platform continues to provide accurate and timely threat intelligence.
  • Users are not allowed to copy, reproduce, redistribute, or sell ThreatSearch content outside these permitted uses. Misusing data, exceeding API limits, or attempting to bypass platform restrictions may result in license revocation and blocked access. Following these rules helps maintain the platform’s security, reliability, and availability for all users.
  • Responsible use protects the quality, accuracy, and integrity of ThreatSearch’s threat intelligence and ensures it remains a valuable resource for the security community. Users should also follow guidance on proper usage, attribution, and sharing to support legal, ethical, and fair use of the platform. Clear adherence to these rules benefits all users and helps sustain the platform over the long term.

User Content & Data Submission

  • ThreatSearch allows users to contribute data such as Indicators of Compromise (IoCs), malware samples, threat reports, and other relevant information. Users maintain ownership of their submitted content but grant ThreatSearch the right to use, anonymize, and share it for research, analysis, and threat intelligence purposes. This data helps improve the platform, supports security research, and enhances the protection of the wider community. All submissions are used to identify emerging threats and improve the accuracy of alerts for users. Contributing data helps make ThreatSearch a more comprehensive and valuable resource.
  • Users are responsible for ensuring their submissions are accurate, legal, and meet ethical standards. Content that violates laws, contains malware without proper context, or is intentionally misleading may be removed, and the user’s access could be restricted.
  • ThreatSearch reviews submissions carefully to maintain the quality, reliability, and safety of the platform. Users should also provide clear and complete information to make their contributions useful to other researchers. Responsible and careful submissions ensure that the platform continues to be trusted and effective for everyone.

Third-Party Content & Integrations

  • ThreatSearch aggregates threat intelligence from third-party feeds and may offer integrations with other security tools to provide a more complete view of potential threats. Users must give proper attribution to external content and comply with the terms set by the original data providers. This helps maintain trust and ensures that all third-party content is used legally and appropriately.
  • These integrations allow users to combine ThreatSearch data with other security systems for better analysis and monitoring. Users should also be aware that third-party content may be updated or changed by the original providers, and they should check for the latest information regularly. Using these integrations responsibly helps ensure that the platform remains useful and accurate for all users.
  • ThreatSearch does not guarantee the accuracy, completeness, or reliability of third-party data. Users access and use this information at their own risk. The platform is not responsible for any errors, omissions, or misuse of third-party content. Users should verify important information before acting on it.
  • Relying on third-party data without verification can lead to mistakes or incorrect conclusions. Careful and responsible use of external data helps maintain the platform’s reliability and ensures that the intelligence shared remains trustworthy for everyone.

Security, Privacy & Data Protection

  • ThreatSearch uses strong security measures to protect the platform, maintain data integrity, and ensure safe interactions for all users. Even though no account or registration is required, the platform follows strict privacy practices to safeguard any user-submitted information. All data is stored securely and monitored to prevent unauthorized access or misuse.
  • ThreatSearch regularly reviews and updates its security protocols to address new risks and maintain platform safety. The platform also limits access to sensitive systems and ensures that internal operations follow strict security standards. Users can trust that the platform is designed to minimize risks and protect the information shared.
  • In the event of a security incident or breach, ThreatSearch follows responsible disclosure procedures and may notify affected users promptly. Users are encouraged to follow basic cybersecurity practices when accessing the platform or downloading data. This includes keeping systems updated, using secure networks, and handling threat intelligence carefully.
  • Both ThreatSearch and its users share responsibility for security, ensuring that the platform remains reliable, trustworthy, and safe for everyone. Users should report any suspicious activity or potential vulnerabilities to help maintain the integrity of the platform. Following these practices helps prevent misuse and supports a safer environment for all users accessing ThreatSearch.

Accuracy, Warranties & Disclaimers

  • ThreatSearch provides threat intelligence to help users make informed security decisions, but all data is offered “as-is” without any guarantee. The platform does not promise that information is complete, fully accurate, or always current. Analyst judgment and human error can affect how threat data is interpreted, and updates may happen frequently.
  • Threat intelligence is always changing, and some information may become outdated or incomplete over time. Users should be aware of these limitations and consider them when using the platform.
  • Users are responsible for independently verifying all Indicators of Compromise (IoCs) and other intelligence before relying on it for security or operational purposes. ThreatSearch is not liable for any damages, losses, or negative consequences resulting from the use of the platform or interpretation of its data.
  • Users should cross-check ThreatSearch information with other trusted sources and use it carefully. Responsible use and verification help ensure the safe and effective application of threat intelligence. Following these practices allows users to benefit from the platform while understanding its natural limitations.

Fees, Billing & Service Levels (SLA)

  • ThreatSearch is completely free to use. No fees, subscriptions, or payments are required to access any features of the platform. To ensure fair access and maintain platform stability, users may encounter limits such as API rate caps or other usage restrictions. These limits help keep the platform available, fast, and reliable for everyone. Users should plan their activities within these limits to avoid interruptions and ensure smooth usage.
  • Service levels, including uptime expectations and support options, are provided on a best-effort basis. While ThreatSearch aims for continuous availability, occasional downtime may occur due to maintenance, updates, or technical issues. Users should be aware of these possibilities and plan critical tasks accordingly.
  • The platform regularly works to improve performance, reliability, and support services. Users can contact the support team if they experience access issues or have questions about the platform.

Intellectual Property & Derivative Works

  • All intellectual property rights related to ThreatSearch, including its software, databases, and platform content, remain the property of Cybersilo. Users may create derivative works, such as research reports, educational projects, or analysis summaries, as long as they are non-commercial and properly credit ThreatSearch as the source.
  • This allows users to use the platform’s data for learning and research while respecting ownership rights. Derivative works must not misrepresent the original content or suggest any endorsement by ThreatSearch or Cybersilo. Users should ensure their work is accurate and reflects the source correctly.
  • Unauthorized copying, redistribution, or commercial use of ThreatSearch’s intellectual property is strictly prohibited. Users must respect trademarks, logos, and other proprietary content to stay legally compliant. Following these rules ensures the platform and its content remain secure, reliable, and available for all users.
  • Respecting intellectual property also supports the continued development and maintenance of ThreatSearch, helping the community access accurate and legally protected threat intelligence. Users who follow these guidelines help maintain a trustworthy and responsible platform for everyone.

Limitation of Liability & Indemnification

  • ThreatSearch is not responsible for any damages, losses, or negative outcomes that may occur from using the platform. This includes errors, downtime, inaccuracies, or misuse of the threat intelligence provided. Users should understand that the platform is offered “as-is” and cannot guarantee perfect or uninterrupted service.
  • Users must take care when relying on the data and use it responsibly for their own security decisions. ThreatSearch cannot be held liable for decisions, actions, or results based on platform content. Users are encouraged to combine ThreatSearch data with other sources to make informed and careful decisions.
  • Users also agree to indemnify and hold ThreatSearch harmless against any legal claims, damages, or costs arising from violations of these Terms of Service or misuse of the platform. This protection also covers contributions from users and reliance on third-party data, ensuring a safe environment for sharing and collaboration. By following these rules, users help keep the platform reliable, secure, and available for everyone.
  • Responsible and careful use of ThreatSearch ensures the community continues to benefit from accurate, open, and trustworthy threat intelligence. Users should report misuse or suspicious activity to help maintain the platform’s integrity. Additionally, users are expected to respect the rights of other contributors and third-party data providers to prevent disputes or misuse.

Term, Suspension & Termination

  • Access to ThreatSearch is continuous and open, with no signup or registration required. However, the platform may suspend or block access if a user misuses the service, engages in malicious activity, or violates these Terms of Service. These actions are necessary to protect the platform, its users, and the integrity of the data.
  • ThreatSearch monitors usage and may take action if behavior threatens service stability, security, or reliability. Users are expected to follow all rules and guidelines to maintain safe and responsible use.
  • When access is suspended or terminated, users may lose access to any submitted data, API integrations, or derivative works linked to the platform. ThreatSearch may retain anonymized or aggregated contributions for ongoing threat intelligence research and analysis.
  • Responsible use helps ensure that the platform remains available, secure, and useful for everyone. Users should report any suspicious activity or potential security concerns to help maintain the platform’s integrity and reliability. Following these practices protects the community and supports the continued development of ThreatSearch.

Export Controls, Compliance & Governing Law

  • Users must follow all local, national, and international laws when using ThreatSearch. This includes export controls, trade restrictions, and sanctions that may apply to certain threat intelligence data. Some data may have specific restrictions depending on the user’s location or jurisdiction.
  • Users are responsible for making sure their use of the platform complies with all applicable laws. Following these rules helps keep the platform lawful and available to everyone.
  • These Terms of Service are governed by the laws of the country where Cybersilo operates. Any disputes related to the use of ThreatSearch will be resolved according to this governing law.
  • Users must comply with all legal obligations and cooperate with any lawful requests or investigations. Following these requirements ensures that ThreatSearch stays secure, reliable, and legally compliant for all users. Responsible use protects both the platform and the wider user community from potential legal issues.

Changes to Terms & Contact Information

  • ThreatSearch may update its Terms of Service at any time. By continuing to use the platform after any updates, users are considered to have accepted the changes. All version histories and updates are maintained to ensure transparency and allow users to review them easily.
  • Users are encouraged to check the Terms of Service regularly to stay informed about any changes. Updates may cover platform features, usage rules, or legal requirements. Staying aware of updates helps users use the platform responsibly and follow current rules.
  • For support, reporting abuse, or legal inquiries, users can contact ThreatSearch through official communication channels. Providing feedback, reporting suspicious activity, or raising concerns responsibly helps maintain the platform’s integrity, safety, and reliability.
  • Clear communication ensures that any issues are addressed quickly and that the platform remains secure and trustworthy. Users are encouraged to reach out if they have questions, encounter problems, or need clarification about the service or updates. Active participation by users helps keep ThreatSearch safe, effective, and valuable for the entire community.