






Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Attachment: Self-sender PDF with minimal content and view prompt | 6h ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-self-sender-pdf-with-minimal-content-and-view-prompt-07670a8c | |
Link: PDF filename impersonation with credential theft language | 7h ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-pdf-filename-impersonation-with-credential-theft-language-05931513 | |
PayPal invoice abuse | 1d ago Feb 11th, 2026 | Sublime Security | /feeds/core/detection-rules/paypal-invoice-abuse-0ff7a0d4 | |
Attachment: QR code with recipient targeting and special characters | 3d ago Feb 9th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09 | |
Reconnaissance: Empty subject with mismatched reply-to from new sender | 6d ago Feb 6th, 2026 | Sublime Security | /feeds/core/detection-rules/reconnaissance-empty-subject-with-mismatched-reply-to-from-new-sender-12f4bd45 | |
Link: Suspicious go.php redirect with document lure | 6d ago Feb 6th, 2026 | Sublime Security | /feeds/core/detection-rules/link-suspicious-gophp-redirect-with-document-lure-f3d8c227 | |
Link: URL shortener with copy-paste instructions and credential theft language | 6d ago Feb 6th, 2026 | Sublime Security | /feeds/core/detection-rules/link-url-shortener-with-copy-paste-instructions-and-credential-theft-language-a0a2c573 | |
Brand impersonation: Microsoft Planner with suspicious link | 6d ago Feb 6th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-planner-with-suspicious-link-ea363c08 | |
Credential phishing: Generic document sharing | 7d ago Feb 5th, 2026 | Sublime Security | /feeds/core/detection-rules/credential-phishing-generic-document-sharing-9f0e1d2c | |
Attachment: Legal themed message or PDF with suspicious indicators | 7d ago Feb 5th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-legal-themed-message-or-pdf-with-suspicious-indicators-19133301 | |
macOS malware: Compiled AppleScript with document double-extension | 7d ago Feb 5th, 2026 | Sublime Security | /feeds/core/detection-rules/macos-malware-compiled-applescript-with-document-double-extension-9669c169 | |
Link: Common hidden directory observed | 9d ago Feb 3rd, 2026 | Sublime Security | /feeds/core/detection-rules/link-common-hidden-directory-observed-9f316da6 | |
Link: Suspicious URL with recipient targeting and special characters | 13d ago Jan 30th, 2026 | Sublime Security | /feeds/core/detection-rules/link-suspicious-url-with-recipient-targeting-and-special-characters-e808be3a | |
Link: 9WOLF phishkit initial landing URI | 13d ago Jan 30th, 2026 | Sublime Security | /feeds/core/detection-rules/link-9wolf-phishkit-initial-landing-uri-a165e206 | |
Attachment: QR code with encoded recipient targeting and redirect indicators | 13d ago Jan 30th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-encoded-recipient-targeting-and-redirect-indicators-5d51e565 | |
Link: URL fragment with hexadecimal pattern obfuscation | 14d ago Jan 29th, 2026 | Sublime Security | /feeds/core/detection-rules/link-url-fragment-with-hexadecimal-pattern-obfuscation-51f51aa0 | |
Attachment: ICS with embedded Javascript in SVG file | 14d ago Jan 29th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-ics-with-embedded-javascript-in-svg-file-d5201a19 | |
Link: HTML file with suspicious binary fragment ending pattern | 14d ago Jan 29th, 2026 | Sublime Security | /feeds/core/detection-rules/link-html-file-with-suspicious-binary-fragment-ending-pattern-dc5e3700 | |
Link: Base64 encoded recipient address in URL fragment with hex subdomain | 14d ago Jan 29th, 2026 | Sublime Security | /feeds/core/detection-rules/link-base64-encoded-recipient-address-in-url-fragment-with-hex-subdomain-781e86ae | |
Attachment: Office file with document sharing and browser instruction lures | 14d ago Jan 29th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b |