



Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Attachment: QR code with suspicious URL patterns in EML file | 12d ago Feb 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-suspicious-url-patterns-in-eml-file-2289acd5 | |
Attachment: cmd file extension | 24d ago Feb 9th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-cmd-file-extension-a902b8ed | |
Attachment: QR code with encoded recipient targeting and redirect indicators | 1mo ago Jan 30th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-encoded-recipient-targeting-and-redirect-indicators-5d51e565 | |
Attachment: Office file with document sharing and browser instruction lures | 1mo ago Jan 29th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b | |
Attachment: PDF with link to zip containing a wsf file | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-link-to-zip-containing-a-wsf-file-93bc7db4 | |
Attachment: Office document with VSTO add-in | 1mo ago Jan 12th, 2026 | @vector_sec | /feeds/core/detection-rules/attachment-office-document-with-vsto-add-in-27afa730 | |
Attachment: Office document loads remote document template | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-document-loads-remote-document-template-d9601104 | |
Attachment: Office file with suspicious function calls or downloaded file path | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-file-with-suspicious-function-calls-or-downloaded-file-path-4c78b969 | |
Attachment: PDF with link to DMG file download | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-link-to-dmg-file-download-2c486fe0 | |
Attachment: PDF file with low reputation links to suspicious filetypes (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-file-with-low-reputation-links-to-suspicious-filetypes-unsolicited-6144f880 | |
Attachment: HTML smuggling with ROT13 | 1mo ago Jan 12th, 2026 | @Kyle_Parrish_ | /feeds/core/detection-rules/attachment-html-smuggling-with-rot13-6eacc4cf | |
Link to auto-download of a suspicious file type (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-to-auto-download-of-a-suspicious-file-type-unsolicited-67ae2152 | |
Attachment: 7z Archive Containing RAR File | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-7z-archive-containing-rar-file-1a629bb4 | |
Attachment: EML with Encrypted ZIP | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-eml-with-encrypted-zip-6897a8f7 | |
Link to auto-downloaded disk image in encrypted zip | 1mo ago Jan 12th, 2026 | @ajpc500 | /feeds/core/detection-rules/link-to-auto-downloaded-disk-image-in-encrypted-zip-b50f0cb1 | |
Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-cve-2021-40444-mshtml-remote-code-execution-vulnerability-8cefcf7f | |
Attachment with VBA macros from employee impersonation (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-with-vba-macros-from-employee-impersonation-unsolicited-9b262123 | |
Attachment with macro calling executable | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-with-macro-calling-executable-5ee6a197 | |
Attachment with auto-opening VBA macro (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-with-auto-opening-vba-macro-unsolicited-d48b3e53 | |
Attachment with auto-executing macro (unsolicited) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-with-auto-executing-macro-unsolicited-af6624c3 |