









Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Brand impersonation: Google Careers | 2h ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-careers-cf2d97ad | |
VIP Impersonation via Google Group relay with suspicious indicators | 3h ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/vip-impersonation-via-google-group-relay-with-suspicious-indicators-57f9cd3b | |
Fake message thread with a suspicious link and engaging language from an unknown sender | 3h ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/fake-message-thread-with-a-suspicious-link-and-engaging-language-from-an-unknown-sender-8fd0e211 | |
VIP impersonation with charitable donation fraud | 3h ago Nov 12th, 2025 | Sublime Security | /feeds/core/detection-rules/vip-impersonation-with-charitable-donation-fraud-35a56b8e | |
Service Abuse: ExactTarget with suspicious sender indicators | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-exacttarget-with-suspicious-sender-indicators-6154f197 | |
Brand impersonation: Survey request with credential theft indicators | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-survey-request-with-credential-theft-indicators-ea1c0e09 | |
Brand impersonation: Microsoft with low reputation links | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6 | |
Credential phishing: Suspicious e-sign agreement document notification | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-e-sign-agreement-document-notification-9b68c2d8 | |
Brand impersonation: SharePoint PDF attachment with credential theft language | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-pdf-attachment-with-credential-theft-language-ae3756fa | |
Brand impersonation: SendGrid | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sendgrid-d800124f | |
Brand impersonation: Paperless Post | 6d ago Nov 6th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-paperless-post-e9ec5e09 | |
Headers: Outlook Express mailer | 6d ago Nov 6th, 2025 | Sublime Security | /feeds/core/detection-rules/headers-outlook-express-mailer-b7a698de | |
Spam: Mastercard promotional content with image-based body | 7d ago Nov 5th, 2025 | Sublime Security | /feeds/core/detection-rules/spam-mastercard-promotional-content-with-image-based-body-5f2cb559 | |
Brand impersonation: Coinbase | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-coinbase-3dca757a | |
Brand impersonation: Amazon | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-amazon-13fc967d | |
Attachment: EML file contains HTML attachment with login portal indicators | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-eml-file-contains-html-attachment-with-login-portal-indicators-6e4df158 | |
ClickFunnels link infrastructure abuse | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/clickfunnels-link-infrastructure-abuse-9192fbe9 | |
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-rfc822-containing-suspicious-file-sharing-language-with-links-from-untrusted-sender-d96854d7 | |
Impersonation: Internal corporate services | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/impersonation-internal-corporate-services-3cd04f33 | |
Spam: Personalized subject and greetings via Salesforce Marketing Cloud | 9d ago Nov 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/spam-personalized-subject-and-greetings-via-salesforce-marketing-cloud-c77f127f |