








Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Brand impersonation: Dropbox | 1d ago Jan 22nd, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-dropbox-61f11d12 | |
Callback phishing in body or attachment (untrusted sender) | 1d ago Jan 22nd, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-in-body-or-attachment-untrusted-sender-b93c6f94 | |
Callback phishing via calendar invite | 1d ago Jan 22nd, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-calendar-invite-95c84360 | |
Attachment: Password-protected PDF with fake document indicators | 2d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-password-protected-pdf-with-fake-document-indicators-b45e4440 | |
Attachment: PDF with recipient email in link | 2d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-recipient-email-in-link-0399d08f | |
Attachment: QR code with recipient targeting and special characters | 2d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09 | |
Attachment: Invoice and W-9 PDFs with suspicious creators | 2d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-invoice-and-w-9-pdfs-with-suspicious-creators-305d6e32 | |
Link to auto-downloaded file with Google Drive branding | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-to-auto-downloaded-file-with-google-drive-branding-4b5343be | |
Attachment: PowerPoint with suspicious hyperlink | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-powerpoint-with-suspicious-hyperlink-0a999fb1 | |
Attachment: QR code link with base64-encoded recipient address | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-link-with-base64-encoded-recipient-address-927a0c1a | |
Attachment: WinRAR CVE-2025-8088 exploitation | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-winrar-cve-2025-8088-exploitation-33b3a82b | |
Attachment: SFX archive containing commands | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-sfx-archive-containing-commands-343e6c8c | |
Attachment: Macro with suspected use of COM ShellBrowserWindow object for process creation | 11d ago Jan 12th, 2026 | @ajpc500 | /feeds/core/detection-rules/attachment-macro-with-suspected-use-of-com-shellbrowserwindow-object-for-process-creation-527fc7f0 | |
Attachment: Small text file with link containing recipient email address | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-small-text-file-with-link-containing-recipient-email-address-c0472c9d | |
Attachment soliciting user to enable macros | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-soliciting-user-to-enable-macros-e9d75515 | |
Attachment: .csproj with suspicious commands | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-csproj-with-suspicious-commands-fe45b81d | |
Suspicious attachment with unscannable Cloudflare link | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/suspicious-attachment-with-unscannable-cloudflare-link-00f92b6f | |
Suspicious VBA macros from untrusted sender | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/suspicious-vba-macros-from-untrusted-sender-37cec120 | |
Attachment: Embedded Javascript in SVG file | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-embedded-javascript-in-svg-file-f70293bc | |
Attachment: Uncommon compressed file | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-uncommon-compressed-file-0c6fba7a |