Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Callback phishing in body or attachment (untrusted sender) | 1d ago Jan 22nd, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-in-body-or-attachment-untrusted-sender-b93c6f94 | |
Attachment: Invoice and W-9 PDFs with suspicious creators | 2d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-invoice-and-w-9-pdfs-with-suspicious-creators-305d6e32 | |
Brand impersonation: Fake Fax | 2d ago Jan 21st, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-fake-fax-2a96b90a | |
Brand impersonation: SendGrid | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sendgrid-d800124f | |
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited) | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-credential-theft-language-and-link-to-a-free-subdomain-unsolicited-90f4ef4e | |
Attachment: Office file with document sharing and browser instruction lures | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b | |
Callback phishing via Intuit service abuse | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-intuit-service-abuse-f2fe1294 | |
Brand impersonation: Internal Revenue Service | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-internal-revenue-service-3c63f8e9 | |
Attachment: PDF with suspicious language and redirect to suspicious file type | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-suspicious-language-and-redirect-to-suspicious-file-type-adda3c3f | |
Attachment soliciting user to enable macros | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-soliciting-user-to-enable-macros-e9d75515 | |
Callback phishing via e-signature service | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-e-signature-service-ed37b4fd | |
Callback phishing: Social Security Administration fraud | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-social-security-administration-fraud-a9049d52 | |
Callback phishing via extensionless rfc822 attachment | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/callback-phishing-via-extensionless-rfc822-attachment-197722c4 | |
Fake scan-to-email message | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/fake-scan-to-email-message-78851fbe | |
Brand impersonation: Amazon with suspicious attachment | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-amazon-with-suspicious-attachment-5751dcb9 | |
Issuu document with suspicious embedded link | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/issuu-document-with-suspicious-embedded-link-0d73f43d | |
Google Accelerated Mobile Pages (AMP) abuse | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/google-accelerated-mobile-pages-amp-abuse-46907029 | |
Brand impersonation: Google fake sign-in warning | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-fake-sign-in-warning-2d998eee | |
Open Redirect: Google domain with /url path and suspicious indicators | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/open-redirect-google-domain-with-url-path-and-suspicious-indicators-fc5adf74 | |
Link to auto-downloaded file with Google Drive branding | 11d ago Jan 12th, 2026 | Sublime Security | /feeds/core/detection-rules/link-to-auto-downloaded-file-with-google-drive-branding-4b5343be |