Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Brand impersonation: TikTok | 6h ago Feb 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-tiktok-aaacc8b7 | |
Brand impersonation: Fake Fax | 7d ago Feb 5th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-fake-fax-2a96b90a | |
Attachment: Legal themed message or PDF with suspicious indicators | 7d ago Feb 5th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-legal-themed-message-or-pdf-with-suspicious-indicators-19133301 | |
Attachment: Office file with document sharing and browser instruction lures | 14d ago Jan 29th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b | |
Link: Microsoft Dynamics 365 form phishing | 16d ago Jan 27th, 2026 | Sublime Security | /feeds/core/detection-rules/link-microsoft-dynamics-365-form-phishing-f72b9085 | |
Attachment: Fake lawyer & sports agent identities | 17d ago Jan 26th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-fake-lawyer-and-sports-agent-identities-7d3a2478 | |
Callback phishing in body or attachment (untrusted sender) | 21d ago Jan 22nd, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-in-body-or-attachment-untrusted-sender-b93c6f94 | |
Attachment: Invoice and W-9 PDFs with suspicious creators | 22d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-invoice-and-w-9-pdfs-with-suspicious-creators-305d6e32 | |
Brand impersonation: SendGrid | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sendgrid-d800124f | |
Brand impersonation: Amazon with suspicious attachment | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-amazon-with-suspicious-attachment-5751dcb9 | |
Issuu document with suspicious embedded link | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/issuu-document-with-suspicious-embedded-link-0d73f43d | |
Google Accelerated Mobile Pages (AMP) abuse | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/google-accelerated-mobile-pages-amp-abuse-46907029 | |
Brand impersonation: Google fake sign-in warning | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-fake-sign-in-warning-2d998eee | |
Open Redirect: Google domain with /url path and suspicious indicators | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/open-redirect-google-domain-with-url-path-and-suspicious-indicators-fc5adf74 | |
Link to auto-downloaded file with Google Drive branding | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-to-auto-downloaded-file-with-google-drive-branding-4b5343be | |
Brand impersonation: Microsoft with low reputation links | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6 | |
Link: Multistage landing - Abused Adobe Acrobat hosted PDF | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-multistage-landing-abused-adobe-acrobat-hosted-pdf-609081ef | |
Link: Multistage landing - Scribd document | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-multistage-landing-scribd-document-afa9807d | |
Suspicious recipient pattern and language with low reputation link to login | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/suspicious-recipient-pattern-and-language-with-low-reputation-link-to-login-a8ea0402 | |
Brand impersonation: Internal Revenue Service | 1mo ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-internal-revenue-service-3c63f8e9 |