








Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Service abuse: SendGrid impersonation via Sendgrid from new sender | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-sendgrid-impersonation-via-sendgrid-from-new-sender-aa5d18ca | |
Brand Impersonation: ShareFile | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharefile-f8330307 | |
Brand impersonation: Google Drive fake file share | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-drive-fake-file-share-b424a941 | |
Xero invoice abuse | 16d ago Dec 17th, 2025 | Sublime Security | /feeds/core/detection-rules/xero-invoice-abuse-6538c600 | |
Brand impersonation: State Farm | 16d ago Dec 17th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-state-farm-bcf7eba0 | |
Callback phishing via Microsoft comment | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-microsoft-comment-8346c7b9 | |
Brand impersonation: Microsoft Teams invitation | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-teams-invitation-46410ad8 | |
Deceptive Dropbox mention | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/deceptive-dropbox-mention-58a107bc | |
Cyrillic vowel substitutions with suspicious subject from unknown sender | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/cyrillic-vowel-substitutions-with-suspicious-subject-from-unknown-sender-10251c3c | |
Credential phishing: Suspicious subject with urgent financial request and link | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-subject-with-urgent-financial-request-and-link-056464f4 | |
Brand impersonation: Wise | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-wise-01480f95 | |
Attachment: Adobe image lure in body or attachment with suspicious link | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-adobe-image-lure-in-body-or-attachment-with-suspicious-link-1d7add81 | |
Service abuse: Callback phishing via Microsoft Teams invite | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-callback-phishing-via-microsoft-teams-invite-13e35e5f | |
Brand impersonation: LinkedIn | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-linkedin-1a0cde6d | |
Brand impersonation: Adobe Sign with suspicious indicators | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-adobe-sign-with-suspicious-indicators-704d143a | |
Brand impersonation: Dropbox | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-dropbox-61f11d12 | |
Brand impersonation: Sharepoint fake file share | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-fake-file-share-ff8b296b | |
Brand impersonation: Microsoft with low reputation links | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6 | |
Brand impersonation: Microsoft logo in HTML with fake quarantine release notification | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-logo-in-html-with-fake-quarantine-release-notification-f12c615c | |
Open redirect (go2.aspx) leading to Microsoft credential phishing | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/open-redirect-go2aspx-leading-to-microsoft-credential-phishing-51667096 |