Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
---|---|---|---|---|
Brand impersonation: Sharepoint | 5h ago Jun 12th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-284b1b70 | |
Attachment: Callback Phishing solicitation via pdf file | 21h ago Jun 11th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-callback-phishing-solicitation-via-pdf-file-ac33f097 | |
Attachment: Suspicious PDF Created With Headless Browser | 3d ago Jun 9th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-suspicious-pdf-created-with-headless-browser-8f3108d7 | |
Attachment: Legal Themed Message with PDF Containing Suspicious Link | 6d ago Jun 6th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-legal-themed-message-with-pdf-containing-suspicious-link-19133301 | |
Brand Impersonation: PayPal | 8d ago Jun 4th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/brand-impersonation-paypal-a6b2ceee | |
Encrypted Microsoft Office Files From Untrusted Senders | 8d ago Jun 4th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/encrypted-microsoft-office-files-from-untrusted-senders-eb7b26e7 | |
Callback Phishing: AOL Senders with Suspicious HTML Template or PDF Attachment | 9d ago Jun 3rd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/callback-phishing-aol-senders-with-suspicious-html-template-or-pdf-attachment-f6044eed | |
Attachment: HTML smuggling with eval and atob via calendar invite | 9d ago Jun 3rd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-html-smuggling-with-eval-and-atob-via-calendar-invite-597c2edd | |
Attachment: HTML smuggling with atob and high entropy via calendar invite | 9d ago Jun 3rd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-html-smuggling-with-atob-and-high-entropy-via-calendar-invite-94d84614 | |
Attachment: EML with Suspicious Indicators | 10d ago Jun 2nd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-eml-with-suspicious-indicators-deb5d08d | |
Suspicious attachment with unscannable Cloudflare link | 10d ago Jun 2nd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/suspicious-attachment-with-unscannable-cloudflare-link-00f92b6f | |
Extortion / Sextortion in Attachment From Untrusted Sender | 10d ago Jun 2nd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/extortion-sextortion-in-attachment-from-untrusted-sender-3cb8d32c | |
Attachment: Embedded Javascript in SVG file | 10d ago Jun 2nd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-embedded-javascript-in-svg-file-f70293bc | |
Attachment: Fake attachment image lure | 13d ago May 30th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-fake-attachment-image-lure-96b8b285 | |
Brand impersonation: Dropbox | 15d ago May 28th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/brand-impersonation-dropbox-61f11d12 | |
Attachment: USDA Bid Invitation Impersonation | 20d ago May 23rd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/attachment-usda-bid-invitation-impersonation-34eb9493 | |
Open redirect: typedrawers.com | 20d ago May 23rd, 2025 UTC | Sublime Security | /feeds/core/detection-rules/open-redirect-typedrawerscom-158d9e95 | |
Brand impersonation: Amazon with suspicious attachment | 29d ago May 14th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/brand-impersonation-amazon-with-suspicious-attachment-5751dcb9 | |
Brand impersonation: Microsoft with low reputation links | 1mo ago May 7th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6 | |
Link: Direct POWR.io Form Builder with Suspicious Patterns | 1mo ago May 5th, 2025 UTC | Sublime Security | /feeds/core/detection-rules/link-direct-powrio-form-builder-with-suspicious-patterns-fd37cc93 |