Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Canva infrastructure abuse | 6d ago Feb 6th, 2026 | Sublime Security | /feeds/core/detection-rules/canva-infrastructure-abuse-b69fdb5c | |
Brand impersonation: Zoom via lookalike domain | 7d ago Feb 5th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-zoom-via-lookalike-domain-b9d5e4b5 | |
ClickFunnels link infrastructure abuse | 7d ago Feb 5th, 2026 | Sublime Security | /feeds/core/detection-rules/clickfunnels-link-infrastructure-abuse-9192fbe9 | |
Impersonation: Executive using numbered local part | 13d ago Jan 30th, 2026 | Sublime Security | /feeds/core/detection-rules/impersonation-executive-using-numbered-local-part-8e005a22 | |
Reconnaissance: Hotel booking reply-to redirect | 16d ago Jan 27th, 2026 | Sublime Security | /feeds/core/detection-rules/reconnaissance-hotel-booking-reply-to-redirect-08c36035 | |
Reconnaissance: Short generic greeting message | 16d ago Jan 27th, 2026 | Sublime Security | /feeds/core/detection-rules/reconnaissance-short-generic-greeting-message-c67dedab | |
BEC/Fraud: Romance scam | 21d ago Jan 22nd, 2026 | Sublime Security | /feeds/core/detection-rules/becfraud-romance-scam-0243cdaa | |
Request for Quote or Purchase (RFQ|RFP) with suspicious sender or recipient pattern | 28d ago Jan 15th, 2026 | Sublime Security | /feeds/core/detection-rules/request-for-quote-or-purchase-rfqorrfp-with-suspicious-sender-or-recipient-pattern-2ac0d329 | |
Attachment: Callback phishing solicitation via image file | 1mo ago Jan 12th, 2026 | @vector_sec | /feeds/core/detection-rules/attachment-callback-phishing-solicitation-via-image-file-60acbb36 | |
Reconnaissance: Email address harvesting attempt | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/reconnaissance-email-address-harvesting-attempt-bb31efbc | |
Credential phishing: Engaging language and other indicators (untrusted sender) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/credential-phishing-engaging-language-and-other-indicators-untrusted-sender-c2bc8ca2 | |
Link: Invoice or receipt from freemail sender with customer service number | 1mo ago Jan 12th, 2026 | @vector_sec | /feeds/core/detection-rules/link-invoice-or-receipt-from-freemail-sender-with-customer-service-number-3825232d | |
Spam: Default Microsoft Exchange Online sender domain (onmicrosoft.com) | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/spam-default-microsoft-exchange-online-sender-domain-onmicrosoftcom-3f2a64ce | |
Spam: URL shortener with short body content and emojis | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/spam-url-shortener-with-short-body-content-and-emojis-b7797e4c | |
Callback phishing via Intuit service abuse | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-intuit-service-abuse-f2fe1294 | |
BEC/Fraud: Job scam fake thread or plaintext pivot to freemail | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/becfraud-job-scam-fake-thread-or-plaintext-pivot-to-freemail-ce21c151 | |
Google services using g.co shortlinks | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/google-services-using-gco-shortlinks-09ff8a73 | |
Attachment: PDF file with link to fake Bitcoin exchange | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-file-with-link-to-fake-bitcoin-exchange-47601cb7 | |
BEC/Fraud: Urgent language and suspicious sending/infrastructure patterns | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/becfraud-urgent-language-and-suspicious-sendinginfrastructure-patterns-ba8a79e0 | |
COVID-19 themed fraud with sender and reply-to mismatch or compensation award | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/covid-19-themed-fraud-with-sender-and-reply-to-mismatch-or-compensation-award-a16480ef |