






Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Link: GoPhish default rid value | 49m ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/link-gophish-default-rid-value-6d2b9c8a | |
Link to a domain with punycode characters | 2h ago Nov 12th, 2025 | @ajpc500 | /feeds/core/detection-rules/link-to-a-domain-with-punycode-characters-74b3698c | |
VIP Impersonation via Google Group relay with suspicious indicators | 3h ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/vip-impersonation-via-google-group-relay-with-suspicious-indicators-57f9cd3b | |
Attachment: 7z Archive Containing RAR File | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-7z-archive-containing-rar-file-1a629bb4 | |
Service Abuse: ExactTarget with suspicious sender indicators | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-exacttarget-with-suspicious-sender-indicators-6154f197 | |
Attachment: Encrypted PDF with credential theft body | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-encrypted-pdf-with-credential-theft-body-c9596c9a | |
Spam: Fake photo share | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/spam-fake-photo-share-eb086f7d | |
Brand impersonation: SharePoint PDF attachment with credential theft language | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-pdf-attachment-with-credential-theft-language-ae3756fa | |
Headers: Outlook Express mailer | 6d ago Nov 6th, 2025 | Sublime Security | /feeds/core/detection-rules/headers-outlook-express-mailer-b7a698de | |
Credential theft: Gophish abuse with hidden tracking image | 7d ago Nov 5th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-theft-gophish-abuse-with-hidden-tracking-image-59915ceb | |
Attachment: ICS file with non-Gregorian calendar scale | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-ics-file-with-non-gregorian-calendar-scale-9315bbf5 | |
Attachment: EML file contains HTML attachment with login portal indicators | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-eml-file-contains-html-attachment-with-login-portal-indicators-6e4df158 | |
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-rfc822-containing-suspicious-file-sharing-language-with-links-from-untrusted-sender-d96854d7 | |
HTML smuggling containing recipient email address | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/html-smuggling-containing-recipient-email-address-af32ff2f | |
Attachment: EML with Encrypted ZIP | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-eml-with-encrypted-zip-6897a8f7 | |
Attachment: EML file with IPFS links | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-eml-file-with-ipfs-links-1fe9d7e7 | |
Xero infrastructure abuse | 9d ago Nov 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/xero-infrastructure-abuse-918c4bd3 | |
Credential phishing: Generic document sharing | 9d ago Nov 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-generic-document-sharing-9f0e1d2c | |
Spam/fraud: Predatory journal/research paper request | 9d ago Nov 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/spamfraud-predatory-journalresearch-paper-request-263ca56b | |
Attachment: HTML file with excessive 'const' declarations and abnormally long timeouts | 9d ago Nov 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-html-file-with-excessive-const-declarations-and-abnormally-long-timeouts-66f8a07a |