









Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Service abuse: SendGrid impersonation via Sendgrid from new sender | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-sendgrid-impersonation-via-sendgrid-from-new-sender-aa5d18ca | |
Extortion / sextortion (untrusted sender) | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/extortion-sextortion-untrusted-sender-265913eb | |
Brand impersonation: Google Drive fake file share | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-drive-fake-file-share-b424a941 | |
Brand Impersonation: ShareFile | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharefile-f8330307 | |
Service abuse: Monday.com infrastructure with phishing intent | 15d ago Dec 18th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-mondaycom-infrastructure-with-phishing-intent-a346e3b1 | |
Service abuse: Google application integration redirecting to suspicious hosts | 16d ago Dec 17th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-google-application-integration-redirecting-to-suspicious-hosts-473d3247 | |
Brand impersonation: State Farm | 16d ago Dec 17th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-state-farm-bcf7eba0 | |
Callback phishing via Microsoft comment | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-microsoft-comment-8346c7b9 | |
Salesforce infrastructure abuse | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/salesforce-infrastructure-abuse-78a77c70 | |
Credential phishing: Suspicious e-sign agreement document notification | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-e-sign-agreement-document-notification-9b68c2d8 | |
Brand impersonation: Microsoft Teams invitation | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-teams-invitation-46410ad8 | |
Deceptive Dropbox mention | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/deceptive-dropbox-mention-58a107bc | |
Credential phishing: Engaging language and other indicators (untrusted sender) | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-engaging-language-and-other-indicators-untrusted-sender-c2bc8ca2 | |
Credential phishing: Suspicious subject with urgent financial request and link | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-subject-with-urgent-financial-request-and-link-056464f4 | |
QR Code with suspicious indicators | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/qr-code-with-suspicious-indicators-04f5c34f | |
Brand impersonation: LinkedIn | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-linkedin-1a0cde6d | |
Brand impersonation: Adobe Sign with suspicious indicators | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-adobe-sign-with-suspicious-indicators-704d143a | |
Link: Self-sender with sender org in subject and credential theft indicator | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/link-self-sender-with-sender-org-in-subject-and-credential-theft-indicator-bfa9aa08 | |
Link: Base64 encoded recipient address in URL fragment with subject hash | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/link-base64-encoded-recipient-address-in-url-fragment-with-subject-hash-eb9694b8 | |
Attachment: Compensation review lure with QR code | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-compensation-review-lure-with-qr-code-9fd8185c |