









Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Attachment: Suspicious employee policy update document lure | 7d ago Dec 26th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-suspicious-employee-policy-update-document-lure-a8bf1fd1 | |
Service abuse: Formester with suspicious link behavior | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-formester-with-suspicious-link-behavior-e4b74fd4 | |
Extortion / sextortion (untrusted sender) | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/extortion-sextortion-untrusted-sender-265913eb | |
Brand impersonation: Google Drive fake file share | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-drive-fake-file-share-b424a941 | |
Brand Impersonation: ShareFile | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharefile-f8330307 | |
Service abuse: Monday.com infrastructure with phishing intent | 15d ago Dec 18th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-mondaycom-infrastructure-with-phishing-intent-a346e3b1 | |
Fake voicemail notification (untrusted sender) | 15d ago Dec 18th, 2025 | Sublime Security | /feeds/core/detection-rules/fake-voicemail-notification-untrusted-sender-74ba7787 | |
Xero invoice abuse | 16d ago Dec 17th, 2025 | Sublime Security | /feeds/core/detection-rules/xero-invoice-abuse-6538c600 | |
Self-sent fake PDF attachment with misleading link | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/self-sent-fake-pdf-attachment-with-misleading-link-8a285d2e | |
Callback phishing via Microsoft comment | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-microsoft-comment-8346c7b9 | |
Salesforce infrastructure abuse | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/salesforce-infrastructure-abuse-78a77c70 | |
Credential phishing: Suspicious e-sign agreement document notification | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-e-sign-agreement-document-notification-9b68c2d8 | |
Business Email Compromise: Request for mobile number via reply thread hijacking | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/business-email-compromise-request-for-mobile-number-via-reply-thread-hijacking-0282f346 | |
Attachment: Calendar file with invisible Unicode characters | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-calendar-file-with-invisible-unicode-characters-050fceac | |
Brand impersonation: Microsoft Teams invitation | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-teams-invitation-46410ad8 | |
Deceptive Dropbox mention | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/deceptive-dropbox-mention-58a107bc | |
Credential phishing: Engaging language and other indicators (untrusted sender) | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-engaging-language-and-other-indicators-untrusted-sender-c2bc8ca2 | |
Cyrillic vowel substitutions with suspicious subject from unknown sender | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/cyrillic-vowel-substitutions-with-suspicious-subject-from-unknown-sender-10251c3c | |
Credential phishing: Suspicious subject with urgent financial request and link | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-subject-with-urgent-financial-request-and-link-056464f4 | |
Brand impersonation: Wise | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-wise-01480f95 |