• Sublime Core Feed

Sublime Core Feed

This repo contains open-source Rules for Sublime, a free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing.

Sublime Security
Last updated May 16th, 2024
Feed Source
GitHub
Detection Method is
Rule Name & Severity
Author
Last Updated
Labels
Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability
Sublime Security
5 months ago
Dec 19th, 2023
Malware/Ransomware
Exploit
Macros
Scripting
Archive analysis
Content analysis
File analysis
Macro analysis
OLE analysis
/feeds/core/detection-rules/attachment-cve-2021-40444-mshtml-remote-code-execution-vulnerability-8cefcf7f
Attachment: Encrypted Microsoft Office file (unsolicited)
Sublime Security
5 months ago
Dec 19th, 2023
/feeds/core/detection-rules/attachment-encrypted-microsoft-office-file-unsolicited-1e47e953
Attachment: Office file contains OLE relationship to credential phishing page
Sublime Security
25 days ago
Apr 25th, 2024
/feeds/core/detection-rules/attachment-office-file-contains-ole-relationship-to-credential-phishing-page-d55793d0
Attachment: OLE external relationship containing file scheme link to executable filetype
Sublime Security
2 months ago
Apr 4th, 2024
/feeds/core/detection-rules/attachment-ole-external-relationship-containing-file-scheme-link-to-executable-filetype-33bf6fd4
Attachment: OLE external relationship containing file scheme link to IP address
Sublime Security
a month ago
Apr 12th, 2024
/feeds/core/detection-rules/attachment-ole-external-relationship-containing-file-scheme-link-to-ip-address-3aab998c
Attachment with auto-executing macro (unsolicited)
Sublime Security
5 months ago
Dec 19th, 2023
/feeds/core/detection-rules/attachment-with-auto-executing-macro-unsolicited-af6624c3
Attachment with high risk VBA macro (unsolicited)
Sublime Security
5 months ago
Dec 19th, 2023
/feeds/core/detection-rules/attachment-with-high-risk-vba-macro-unsolicited-a2b20e16
7 Rules