Sublime Core Feed

This repo contains open-source Rules for Sublime, a free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing.

Sublime Security
Last updated Apr 21st, 2026
Feed Source
Detection Method is
Rule Name & Severity
Author
Last Updated
Labels
Attachment: Archive contains DLL-loading macro
Sublime Security
3y ago
Dec 28th, 2023
Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability
Sublime Security
3mo ago
Jan 12th, 2026
Attachment: Excel file with document sharing lure created by Go Excelize
Sublime Security
2mo ago
Jan 29th, 2026
Attachment: Macro files containing MHT content
Sublime Security
3mo ago
Jan 12th, 2026
Attachment: Macro with suspected use of COM ShellBrowserWindow object for process creation
@ajpc500
3mo ago
Jan 12th, 2026
Attachment: Office file with document sharing and browser instruction lures
Sublime Security
2mo ago
Jan 29th, 2026
Attachment: Potential sandbox evasion in Office file
@ajpc500
3mo ago
Jan 12th, 2026
Attachment soliciting user to enable macros
Sublime Security
3mo ago
Jan 12th, 2026
Attachment with auto-executing macro (unsolicited)
Sublime Security
3mo ago
Jan 12th, 2026
Attachment with auto-opening VBA macro (unsolicited)
Sublime Security
3mo ago
Jan 12th, 2026
Attachment with high risk VBA macro (unsolicited)
Sublime Security
3mo ago
Jan 12th, 2026
Attachment with VBA macros from employee impersonation (unsolicited)
Sublime Security
3mo ago
Jan 12th, 2026
Suspicious VBA macros from untrusted sender
Sublime Security
3mo ago
Jan 12th, 2026