Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Brand impersonation: File sharing notification with template artifacts | 16m ago Jan 23rd, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-file-sharing-notification-with-template-artifacts-37d89611 | |
Attachment: QR code with recipient targeting and special characters | 2d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09 | |
Brand impersonation: Fake Fax | 2d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-fake-fax-2a96b90a | |
Brand impersonation: USPS | 3d ago Jan 20th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-usps-28b9130a | |
Brand impersonation: Quickbooks | 8d ago Jan 15th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-quickbooks-4fd791d1 | |
Callback phishing via Xodo Sign comment | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-xodo-sign-comment-6f722c5d | |
Credential phishing: DocuSign embedded image lure with no DocuSign domains in links | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/credential-phishing-docusign-embedded-image-lure-with-no-docusign-domains-in-links-dfe8715e | |
Suspicious invoice reference with missing or image-only attachments | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/suspicious-invoice-reference-with-missing-or-image-only-attachments-466c1680 | |
Brand Impersonation: PayPal | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-paypal-a6b2ceee | |
Free subdomain link with login or captcha (untrusted sender) | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/free-subdomain-link-with-login-or-captcha-untrusted-sender-93288f82 | |
Brand impersonation: Microsoft with low reputation links | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6 | |
Link: Multistage landing - Abused Adobe Acrobat hosted PDF | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-multistage-landing-abused-adobe-acrobat-hosted-pdf-609081ef | |
Link: Multistage landing - Scribd document | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-multistage-landing-scribd-document-afa9807d | |
Suspicious recipients pattern with no Compauth pass and suspicious content | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/suspicious-recipients-pattern-with-no-compauth-pass-and-suspicious-content-34fb65f6 | |
Suspicious recipient pattern and language with low reputation link to login | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/suspicious-recipient-pattern-and-language-with-low-reputation-link-to-login-a8ea0402 | |
Callback phishing via Adobe Sign comment | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-adobe-sign-comment-7eb4516d | |
Brand Impersonation: Disney | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-disney-bf90b8fb | |
Brand impersonation: Sharepoint fake file share | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-fake-file-share-ff8b296b | |
Attachment: HTML smuggling - QR Code with suspicious links | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-html-smuggling-qr-code-with-suspicious-links-010e757d | |
Credential phishing: Image as content, short or no body contents | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/credential-phishing-image-as-content-short-or-no-body-contents-01313f38 |