



Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Attachment: cmd file extension | 3d ago Feb 9th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-cmd-file-extension-a902b8ed | |
Attachment: QR code with encoded recipient targeting and redirect indicators | 13d ago Jan 30th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-encoded-recipient-targeting-and-redirect-indicators-5d51e565 | |
Attachment: Office file with document sharing and browser instruction lures | 14d ago Jan 29th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b | |
Attachment: HTML smuggling with ROT13 | 1mo ago Jan 12th, 2026 | @Kyle_Parrish_ | /feeds/core/detection-rules/attachment-html-smuggling-with-rot13-6eacc4cf | |
Attachment soliciting user to enable macros | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-soliciting-user-to-enable-macros-e9d75515 | |
Attachment: Uncommon compressed file | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-uncommon-compressed-file-0c6fba7a | |
Attachment with auto-executing macro (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-with-auto-executing-macro-unsolicited-af6624c3 | |
Attachment: Office file with credential phishing URLs | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-file-with-credential-phishing-urls-b2cae98d | |
Attachment: Office document with VSTO add-in | 1mo ago Jan 12th, 2026 | @vector_sec | /feeds/core/detection-rules/attachment-office-document-with-vsto-add-in-27afa730 | |
Attachment: Office document loads remote document template | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-document-loads-remote-document-template-d9601104 | |
Attachment: Office file with suspicious function calls or downloaded file path | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-file-with-suspicious-function-calls-or-downloaded-file-path-4c78b969 | |
Attachment: PDF with link to DMG file download | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-link-to-dmg-file-download-2c486fe0 | |
Attachment: PDF with link to zip containing a wsf file | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-link-to-zip-containing-a-wsf-file-93bc7db4 | |
Attachment: PDF file with low reputation links to suspicious filetypes (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-file-with-low-reputation-links-to-suspicious-filetypes-unsolicited-6144f880 | |
Attachment: PDF file with low reputation link to ZIP file (unsolicited) | 1mo ago Jan 12th, 2026 | Michael Tingle | /feeds/core/detection-rules/attachment-pdf-file-with-low-reputation-link-to-zip-file-unsolicited-d1ee2859 | |
Attachment: WinRAR CVE-2025-8088 exploitation | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-winrar-cve-2025-8088-exploitation-33b3a82b | |
Attachment: Embedded Javascript in SVG file | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-embedded-javascript-in-svg-file-f70293bc | |
Link to auto-download of a suspicious file type (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-to-auto-download-of-a-suspicious-file-type-unsolicited-67ae2152 | |
Attachment: 7z Archive Containing RAR File | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-7z-archive-containing-rar-file-1a629bb4 | |
Attachment: EML with Encrypted ZIP | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-eml-with-encrypted-zip-6897a8f7 |