









Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Credential phishing: Generic document sharing | 3d ago Feb 14th, 2026 | Sublime Security | /feeds/core/detection-rules/credential-phishing-generic-document-sharing-9f0e1d2c | |
Brand impersonation: Punchbowl | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-punchbowl-58937ba0 | |
Brand impersonation: Amazon | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-amazon-13fc967d | |
Russia return-path TLD (untrusted sender) | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/russia-return-path-tld-untrusted-sender-588b3954 | |
Brand Impersonation: PayPal | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-paypal-a6b2ceee | |
Credential phishing: Tax form impersonation with payment request | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/credential-phishing-tax-form-impersonation-with-payment-request-717695cf | |
Brand impersonation: USPS | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-usps-28b9130a | |
Link: Credential theft with invisible Unicode character in page title from unsolicited sender | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/link-credential-theft-with-invisible-unicode-character-in-page-title-from-unsolicited-sender-5fe14d53 | |
Link: Suspicious SharePoint document name | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/link-suspicious-sharepoint-document-name-f95fee6e | |
File sharing link from suspicious sender domain | 4d ago Feb 13th, 2026 | Sublime Security | /feeds/core/detection-rules/file-sharing-link-from-suspicious-sender-domain-95f20354 | |
Attachment: Self-sender PDF with minimal content and view prompt | 5d ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-self-sender-pdf-with-minimal-content-and-view-prompt-07670a8c | |
Brand impersonation: Dropbox | 5d ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-dropbox-61f11d12 | |
Open redirect: embluemail.com | 5d ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/open-redirect-embluemailcom-48c5abd3 | |
Brand impersonation: TikTok | 5d ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-tiktok-aaacc8b7 | |
Link: PDF filename impersonation with credential theft language | 5d ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-pdf-filename-impersonation-with-credential-theft-language-05931513 | |
Brand impersonation: Google Meet with malicious link | 5d ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-meet-with-malicious-link-d488d85a | |
Attachment: QR code with recipient targeting and special characters | 8d ago Feb 9th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09 | |
Brand impersonation: Navan | 8d ago Feb 9th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-navan-3573e9a8 | |
Reconnaissance: Empty subject with mismatched reply-to from new sender | 11d ago Feb 6th, 2026 | Sublime Security | /feeds/core/detection-rules/reconnaissance-empty-subject-with-mismatched-reply-to-from-new-sender-12f4bd45 | |
Link: Suspicious go.php redirect with document lure | 11d ago Feb 6th, 2026 | Sublime Security | /feeds/core/detection-rules/link-suspicious-gophp-redirect-with-document-lure-f3d8c227 |