









Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Link: GoPhish default rid value | 49m ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/link-gophish-default-rid-value-6d2b9c8a | |
Brand impersonation: Google Careers | 2h ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-careers-cf2d97ad | |
Link to a domain with punycode characters | 2h ago Nov 12th, 2025 | @ajpc500 | /feeds/core/detection-rules/link-to-a-domain-with-punycode-characters-74b3698c | |
VIP Impersonation via Google Group relay with suspicious indicators | 3h ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/vip-impersonation-via-google-group-relay-with-suspicious-indicators-57f9cd3b | |
Fake message thread with a suspicious link and engaging language from an unknown sender | 3h ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/fake-message-thread-with-a-suspicious-link-and-engaging-language-from-an-unknown-sender-8fd0e211 | |
Attachment: PDF with Microsoft Purview message impersonation | 2d ago Nov 10th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-microsoft-purview-message-impersonation-571d4964 | |
Service Abuse: ExactTarget with suspicious sender indicators | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-exacttarget-with-suspicious-sender-indicators-6154f197 | |
Attachment: Encrypted PDF with credential theft body | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-encrypted-pdf-with-credential-theft-body-c9596c9a | |
Brand impersonation: Survey request with credential theft indicators | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-survey-request-with-credential-theft-indicators-ea1c0e09 | |
Brand impersonation: Microsoft with low reputation links | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6 | |
Credential phishing: Suspicious e-sign agreement document notification | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-e-sign-agreement-document-notification-9b68c2d8 | |
Brand impersonation: SharePoint PDF attachment with credential theft language | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-pdf-attachment-with-credential-theft-language-ae3756fa | |
Brand impersonation: SendGrid | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sendgrid-d800124f | |
Brand impersonation: Paperless Post | 6d ago Nov 6th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-paperless-post-e9ec5e09 | |
Headers: Outlook Express mailer | 6d ago Nov 6th, 2025 | Sublime Security | /feeds/core/detection-rules/headers-outlook-express-mailer-b7a698de | |
Service Abuse: Nifty.com with impersonation | 7d ago Nov 5th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-niftycom-with-impersonation-370cfdac | |
Compensation review with QR code in attached EML | 7d ago Nov 5th, 2025 | Sublime Security | /feeds/core/detection-rules/compensation-review-with-qr-code-in-attached-eml-98a2f03c | |
Credential phishing: Fake storage alerts (unsolicited) | 7d ago Nov 5th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-fake-storage-alerts-unsolicited-750f04d6 | |
Brand impersonation: USPS | 7d ago Nov 5th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-usps-28b9130a | |
Spam: Mastercard promotional content with image-based body | 7d ago Nov 5th, 2025 | Sublime Security | /feeds/core/detection-rules/spam-mastercard-promotional-content-with-image-based-body-5f2cb559 |