Sublime Thoughts

How to build fast similarity search for email from the ground up
December 18, 2025
Sublime news

How to build fast similarity search for email from the ground up

How to build fast similarity search for email from the ground up
Ross Wolf
Engineering
How to build fast similarity search for email from the ground up
group
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person
December 16, 2025
Evolving our brand as Sublime grows
Sublime news

Evolving our brand as Sublime grows

Omar JalalzadaPerson
Omar Jalalzada
Head of Design
Kirk JohnsonPerson
Kirk Johnson
Creative Director
December 9, 2025
Automatic malicious calendar event remediation
Sublime news

Automatic malicious calendar event remediation

Ahry JeonPerson
Ahry Jeon
Product Manager
Person
December 4, 2025
Sublime’s AI agents are just the tip of the platform
Machine learning

Sublime’s AI agents are just the tip of the platform

Aryan LuthraPerson
Aryan Luthra
ML Researcher
Person
November 21, 2025
You’ve been invited to join a Meta for Business scam!
Attack spotlight

You’ve been invited to join a Meta for Business scam!

Luke WescottPerson
Luke Wescott
Detection
Person
November 13, 2025
Salesforce infrastructure abuse: Stopping email scams and spam sent via SFDC
Attack spotlight

Salesforce infrastructure abuse: Stopping email scams and spam sent via SFDC

Brandon MurphyPerson
Brandon Murphy
Detection
Person
November 3, 2025
ICS phishing: Stopping a surge of malicious calendar invites
Attack spotlight

ICS phishing: Stopping a surge of malicious calendar invites

Ahry JeonPerson
Ahry Jeon
Product Manager
Brandon MurphyPerson
Brandon Murphy
Detection
October 28, 2025
Sublime raises $150M Series C to arm defenders for the post-LLM world
Sublime news

Sublime raises $150M Series C to arm defenders for the post-LLM world

Josh KamdjouPerson
Josh Kamdjou
Co-founder & CEO
Ian ThielPerson
Ian Thiel
Co-founder & COO
October 23, 2025
Direct Send abuse on Microsoft 365: Just another failed authentication
Attack spotlight

Direct Send abuse on Microsoft 365: Just another failed authentication

Peter DjordjevicPerson
Peter Djordjevic
Detection
Person
October 16, 2025
Facebook credential phishing with job scams impersonating well-known companies
Attack spotlight

Facebook credential phishing with job scams impersonating well-known companies

Bryan CampbellPerson
Bryan Campbell
Detection
Person
October 14, 2025
Google Careers impersonation credential phishing scam with endless variation
Attack spotlight

Google Careers impersonation credential phishing scam with endless variation

Brandon MurphyPerson
Brandon Murphy
Detection
Person
October 8, 2025
UK Home Office visa & immigration scam targets Sponsor Management System accounts
Attack spotlight

UK Home Office visa & immigration scam targets Sponsor Management System accounts

Bryan CampbellPerson
Bryan Campbell
Detection
Person
October 2, 2025
Impersonated Evite and Punchbowl invitations used for credential phishing and malware distribution
Attack spotlight

Impersonated Evite and Punchbowl invitations used for credential phishing and malware distribution

Brandon WebsterPerson
Brandon Webster
Detection
Bryan CampbellPerson
Bryan Campbell
Detection
September 25, 2025
More than “plausible nonsense”: A rigorous eval for ADÉ, our security coding agent
Machine learning

More than “plausible nonsense”: A rigorous eval for ADÉ, our security coding agent

Bobby FilarPerson
Bobby Filar
Machine Learning
Dr. Anna BertigerPerson
Dr. Anna Bertiger
ML Researcher
September 23, 2025
Fake Meta Ads Manager in App Store and TestFlight used to phish Meta ad accounts
Attack spotlight

Fake Meta Ads Manager in App Store and TestFlight used to phish Meta ad accounts

Brandon WebsterPerson
Brandon Webster
Detection
Threat Research TeamPerson
Threat Research Team
Sublime
September 11, 2025
Meet ADÉ: The Autonomous Detection Engineer for email
Sublime news

Meet ADÉ: The Autonomous Detection Engineer for email

AJ WilliamsPerson
AJ Williams
Product Manager
Aryan LuthraPerson
Aryan Luthra
ML Researcher
September 4, 2025
Callback phishing with online appointment abuse and distribution lists
Attack spotlight

Callback phishing with online appointment abuse and distribution lists

Brandon WebsterPerson
Brandon Webster
Detection
Person
August 28, 2025
Email bomb detection and prevention with Sublime
Sublime news

Email bomb detection and prevention with Sublime

Dr. Anna BertigerPerson
Dr. Anna Bertiger
ML Researcher
AJ WilliamsPerson
AJ Williams
Product Manager
August 26, 2025
Technical deep dive of NLU 3.0: Modular, multi-headed, with advanced synthetic training
Machine learning

Technical deep dive of NLU 3.0: Modular, multi-headed, with advanced synthetic training

Stefano MeschiariPerson
Stefano Meschiari
ML Researcher
Aryan LuthraPerson
Aryan Luthra
ML Researcher
August 18, 2025
Everything old is new again: 3 trends from Black Hat USA, BSides LV, and DEF CON 33
Sublime news

Everything old is new again: 3 trends from Black Hat USA, BSides LV, and DEF CON 33

Andrew BechererPerson
Andrew Becherer
CISO
Person
August 13, 2025
Sublime NLU 3.0: Faster, more accurate, future-proof defense against AI email attacks
Sublime news

Sublime NLU 3.0: Faster, more accurate, future-proof defense against AI email attacks

Aryan LuthraPerson
Aryan Luthra
ML Researcher
Stefano MeschiariPerson
Stefano Meschiari
ML Researcher
July 31, 2025
Multi-RMM attack: Splashtop Streamer and Atera payloads delivered via Discord CDN link
Attack spotlight

Multi-RMM attack: Splashtop Streamer and Atera payloads delivered via Discord CDN link

Josh "Soup" CampbellPerson
Josh "Soup" Campbell
Detection
Brandon MurphyPerson
Brandon Murphy
Detection
July 24, 2025
Keitaro TDS abused to deliver AutoIT-based loader targeting German speakers
Threat detection

Keitaro TDS abused to deliver AutoIT-based loader targeting German speakers

Bryan CampbellPerson
Bryan Campbell
Detection
Brian BaskinPerson
Brian Baskin
Threat Research
July 17, 2025
Phishing for Xfinity credentials with malicious Zoom Docs
Attack spotlight

Phishing for Xfinity credentials with malicious Zoom Docs

Brandon WebsterPerson
Brandon Webster
Detection
Person
July 2, 2025
Living Off Trusted Sites: Zoom service abuse to deliver credential phishing attack
Attack spotlight

Living Off Trusted Sites: Zoom service abuse to deliver credential phishing attack

Josh "Soup" CampbellPerson
Josh "Soup" Campbell
Detection
Person
June 25, 2025
Using the X/Twitter link shortener (t.co) to hide an AITM credential phishing payload
Attack spotlight

Using the X/Twitter link shortener (t.co) to hide an AITM credential phishing payload

Brandon WebsterPerson
Brandon Webster
Detection
Person
June 18, 2025
Community Spotlight: Email Detection Rules built by the Sublime Community
Threat detection

Community Spotlight: Email Detection Rules built by the Sublime Community

Threat Detection TeamPerson
Threat Detection Team
Sublime
Person
June 12, 2025
AITM phishing with Russian infrastructure and detection evasion from a lapsed domain
Attack spotlight

AITM phishing with Russian infrastructure and detection evasion from a lapsed domain

Brandon MurphyPerson
Brandon Murphy
Detection
Threat Research TeamPerson
Threat Research Team
Sublime
May 29, 2025
Detecting an email-based ClickFix attack that delivers DCRat malware payload
Attack spotlight

Detecting an email-based ClickFix attack that delivers DCRat malware payload

Josh "Soup" CampbellPerson
Josh "Soup" Campbell
Detection
Brandon MurphyPerson
Brandon Murphy
Detection
May 15, 2025
How ASA thinks: The technical architecture of Sublime’s Autonomous Security Analyst
Machine learning

How ASA thinks: The technical architecture of Sublime’s Autonomous Security Analyst

Aryan LuthraPerson
Aryan Luthra
ML Researcher
Person
May 8, 2025
ScreenConnect as malware via Canva abuse and Docusign impersonation
Attack spotlight

ScreenConnect as malware via Canva abuse and Docusign impersonation

Brian BaskinPerson
Brian Baskin
Threat Research
Brandon WebsterPerson
Brandon Webster
Detection
April 30, 2025
Figma abuse from compromised vendor used in credential theft attack
Attack spotlight

Figma abuse from compromised vendor used in credential theft attack

Sam ScholtenPerson
Sam Scholten
Detection
Person
April 28, 2025
Key findings from the Q1 2025 Sublime Email Threat Research Report
Sublime news

Key findings from the Q1 2025 Sublime Email Threat Research Report

Machine Learning TeamPerson
Machine Learning Team
Sublime
Threat Detection TeamPerson
Threat Detection Team
Sublime
April 23, 2025
Introducing ASA: The Autonomous Security Analyst for email
Sublime news

Introducing ASA: The Autonomous Security Analyst for email

AJ WilliamsPerson
AJ Williams
Product Manager
Brian WilcoxPerson
Brian Wilcox
Product Manager
April 21, 2025
Welcoming Andrew Becherer as Sublime’s CISO
Sublime news

Welcoming Andrew Becherer as Sublime’s CISO

Josh KamdjouPerson
Josh Kamdjou
Co-founder & CEO
Person
April 17, 2025
Elastic + Sublime: Adding email to your security and observability stack
Sublime news

Elastic + Sublime: Adding email to your security and observability stack

AJ WilliamsPerson
AJ Williams
Product Manager
Person
April 10, 2025
TROX Stealer: A deep dive into a new Malware as a Service (MaaS) attack campaign
Threat detection

TROX Stealer: A deep dive into a new Malware as a Service (MaaS) attack campaign

Threat Research TeamPerson
Threat Research Team
Sublime
Brian BaskinPerson
Brian Baskin
Threat Research
April 3, 2025
$500K financial fraud built on BEC, a domain lookalike, and a fake thread
Attack spotlight

$500K financial fraud built on BEC, a domain lookalike, and a fake thread

Sam ScholtenPerson
Sam Scholten
Detection
Person
April 1, 2025
Who are you trying to April Fool with that email scam?
Attack spotlight

Who are you trying to April Fool with that email scam?

Threat Detection TeamPerson
Threat Detection Team
Sublime
Person
March 27, 2025
Tycoon 2FA credential phishing with cloned internal employee login
Attack spotlight

Tycoon 2FA credential phishing with cloned internal employee login

Peter DjordjevicPerson
Peter Djordjevic
Detection
Person
March 20, 2025
Microsoft OAuth URL used as redirect to AITM credential phishing site
Attack spotlight

Microsoft OAuth URL used as redirect to AITM credential phishing site

Brandon MurphyPerson
Brandon Murphy
Detection
Person
March 13, 2025
Seeing both sides of a service abuse financial fraud using YOPmail disposable messages
Attack spotlight

Seeing both sides of a service abuse financial fraud using YOPmail disposable messages

Josh "Soup" CampbellPerson
Josh "Soup" Campbell
Detection
Person
March 6, 2025
Base64-encoding an SVG attack within an iframe and hiding it all in an EML attachment
Attack spotlight

Base64-encoding an SVG attack within an iframe and hiding it all in an EML attachment

Sam ScholtenPerson
Sam Scholten
Detection
Brandon MurphyPerson
Brandon Murphy
Detection
February 25, 2025
Scripting Vector Grifts: SVG phishing with smuggled JS and adversary in the middle tactics
Attack spotlight

Scripting Vector Grifts: SVG phishing with smuggled JS and adversary in the middle tactics

Brandon MurphyPerson
Brandon Murphy
Detection
Brandon WebsterPerson
Brandon Webster
Detection
February 18, 2025
Tax season email attacks: AdWind RATs and Tycoon 2FA phishing kits
Attack spotlight

Tax season email attacks: AdWind RATs and Tycoon 2FA phishing kits

Brandon WebsterPerson
Brandon Webster
Detection
Brandon MurphyPerson
Brandon Murphy
Detection
February 7, 2025
Email Topic Modeling: Simplifying detection with ML-powered granularity
Machine learning

Email Topic Modeling: Simplifying detection with ML-powered granularity

Aryan LuthraPerson
Aryan Luthra
ML Researcher
Person
January 29, 2025
Credential phishing Charles Schwab account holders with 2FA bypass
Attack spotlight

Credential phishing Charles Schwab account holders with 2FA bypass

Aiden MitchellPerson
Aiden Mitchell
Detection
Person
January 24, 2025
Enhanced message groups: Improving efficiency in email incident response
Sublime news

Enhanced message groups: Improving efficiency in email incident response

AJ WilliamsPerson
AJ Williams
Product Manager
Person
January 7, 2025
Hiding a $50,000 BEC financial fraud in a fake email thread
Attack spotlight

Hiding a $50,000 BEC financial fraud in a fake email thread

Sam ScholtenPerson
Sam Scholten
Detection
Person
December 19, 2024
Callback phishing via invoice abuse and distribution list relays
Attack spotlight

Callback phishing via invoice abuse and distribution list relays

Brandon MurphyPerson
Brandon Murphy
Detection
Person
December 17, 2024
B2B freight-forwarding scams on the rise to evade financial fraud crackdowns
Attack spotlight

B2B freight-forwarding scams on the rise to evade financial fraud crackdowns

Sam ScholtenPerson
Sam Scholten
Detection
Person
December 12, 2024
Sublime raises Series B to… keep doing what we’ve been doing, but better
Sublime news

Sublime raises Series B to… keep doing what we’ve been doing, but better

Josh KamdjouPerson
Josh Kamdjou
Co-founder & CEO
Person
December 11, 2024
Xloader deep dive: Link-based malware delivery via SharePoint impersonation
Threat detection

Xloader deep dive: Link-based malware delivery via SharePoint impersonation

Threat Research TeamPerson
Threat Research Team
Sublime
Person
December 4, 2024
Detecting malicious AnonymousFox email messages sent from compromised sites
Threat detection

Detecting malicious AnonymousFox email messages sent from compromised sites

Sam ScholtenPerson
Sam Scholten
Detection
Person
November 27, 2024
Talking phish over turkey
Attack spotlight

Talking phish over turkey

Brandon MurphyPerson
Brandon Murphy
Detection
Aiden MitchellPerson
Aiden Mitchell
Detection
November 20, 2024
Hidden credential phishing within EML attachments
Attack spotlight

Hidden credential phishing within EML attachments

Aiden MitchellPerson
Aiden Mitchell
Detection
Person
November 14, 2024
Living Off the Land: Credential Phishing via Docusign abuse
Attack spotlight

Living Off the Land: Credential Phishing via Docusign abuse

Brandon MurphyPerson
Brandon Murphy
Detection
Person
November 6, 2024
Living Off the Land: Callback Phishing via Docusign comment
Attack spotlight

Living Off the Land: Callback Phishing via Docusign comment

Brandon MurphyPerson
Brandon Murphy
Detection
Person
October 30, 2024
Adversarial ML: Extortion via LLM Manipulation Tactics
Attack spotlight

Adversarial ML: Extortion via LLM Manipulation Tactics

Threat Detection TeamPerson
Threat Detection Team
Sublime
Person
October 21, 2024
Combating GenAI Email Attacks with BERT LLM
Machine learning

Combating GenAI Email Attacks with BERT LLM

Aryan LuthraPerson
Aryan Luthra
ML Researcher
Vivek SharathPerson
Vivek Sharath
ML Engineer
September 26, 2024
Correlate Sublime Logs in Panther for Centralized Threat Detection
Threat detection

Correlate Sublime Logs in Panther for Centralized Threat Detection

Robbie AdamsPerson
Robbie Adams
Sales Engineer
Jonathan BuncePerson
Jonathan Bunce
Software Engineer
August 30, 2024
Payroll Fraud via LLM-Generated Emails
Attack spotlight

Payroll Fraud via LLM-Generated Emails

Threat Detection TeamPerson
Threat Detection Team
Sublime
Person
July 2, 2024
Abusing Discord to deliver Agent Tesla malware
Attack spotlight

Abusing Discord to deliver Agent Tesla malware

Threat Detection TeamPerson
Threat Detection Team
Sublime
Person
June 26, 2024
Fake invoice used to conduct $16,800 BEC attempt
Attack spotlight

Fake invoice used to conduct $16,800 BEC attempt

Threat Detection TeamPerson
Threat Detection Team
Sublime
Person
June 10, 2024
Sublime Attack Score: Explainable, AI-backed threat analysis
Machine learning

Sublime Attack Score: Explainable, AI-backed threat analysis

Bobby FilarPerson
Bobby Filar
Machine Learning
Person
April 24, 2024
Announcing our $20M Series A to redefine email security
Sublime news

Announcing our $20M Series A to redefine email security

Josh KamdjouPerson
Josh Kamdjou
Co-founder & CEO
Person
March 23, 2024
Gotta Catch 'Em All: Detecting PikaBot Delivery Techniques
Threat detection

Gotta Catch 'Em All: Detecting PikaBot Delivery Techniques

Sam ScholtenPerson
Sam Scholten
Detection
Person
October 4, 2023
QR Code Phishing: Decoding Hidden Threats
Threat detection

QR Code Phishing: Decoding Hidden Threats

Sam ScholtenPerson
Sam Scholten
Detection
Person
September 6, 2023
Call Me Maybe? The Rise of Callback Phishing Emails
Threat detection

Call Me Maybe? The Rise of Callback Phishing Emails

Sam ScholtenPerson
Sam Scholten
Detection
Person
April 18, 2023
Unmasking BEC attacks using Natural Language Understanding + MQL
Machine learning

Unmasking BEC attacks using Natural Language Understanding + MQL

Bobby FilarPerson
Bobby Filar
Machine Learning
Person
April 12, 2023
Detecting QakBot: WSF attachments, OneNote files, and generic attack surface reduction
Threat detection

Detecting QakBot: WSF attachments, OneNote files, and generic attack surface reduction

Sam ScholtenPerson
Sam Scholten
Detection
Person
March 30, 2023
Detecting Credential Phishing using Deep Learning + MQL
Attack spotlight

Detecting Credential Phishing using Deep Learning + MQL

Bobby FilarPerson
Bobby Filar
Machine Learning
Person
March 24, 2023
Introduction to Message Query Language (MQL)
Threat detection

Introduction to Message Query Language (MQL)

Ross WolfPerson
Ross Wolf
Engineering
Person
February 22, 2023
Introducing Sublime: A new, open approach to email security
Sublime news

Introducing Sublime: A new, open approach to email security

Josh KamdjouPerson
Josh Kamdjou
Co-founder & CEO
Person
Item not found

No Results Found

Oops! No Blog found for this category.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern