







Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Attachment: Suspicious employee policy update document lure | 7d ago Dec 26th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-suspicious-employee-policy-update-document-lure-a8bf1fd1 | |
Attachment: PDF generated with wkhtmltopdf tool and default title | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-generated-with-wkhtmltopdf-tool-and-default-title-64e6c8a8 | |
Attachment: Compensation review lure with QR code | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-compensation-review-lure-with-qr-code-9fd8185c | |
Attachment: PDF with link to DMG file download | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-link-to-dmg-file-download-2c486fe0 | |
Attachment: PDF with personal Microsoft OneNote URL | 29d ago Dec 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-personal-microsoft-onenote-url-0675bbc5 | |
Attachment: Encrypted PDF with credential theft body | 1mo ago Dec 1st, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-encrypted-pdf-with-credential-theft-body-c9596c9a | |
Attachment: Legal themed message or PDF with suspicious indicators | 1mo ago Dec 1st, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-legal-themed-message-or-pdf-with-suspicious-indicators-19133301 | |
Attachment: PDF with Microsoft Purview message impersonation | 1mo ago Nov 10th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-microsoft-purview-message-impersonation-571d4964 | |
Brand impersonation: SharePoint PDF attachment with credential theft language | 1mo ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-pdf-attachment-with-credential-theft-language-ae3756fa | |
Brand impersonation: DocuSign PDF attachment with suspicious link | 2mo ago Oct 22nd, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-docusign-pdf-attachment-with-suspicious-link-2601cbb7 | |
Brand Impersonation: Google (QR Code) | 2mo ago Oct 17th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-qr-code-7ffd184c | |
Brand impersonation: DocuSign (QR code) | 2mo ago Oct 15th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-docusign-qr-code-0b16c28a | |
Attachment: PDF with recipient email in link | 2mo ago Oct 10th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-recipient-email-in-link-0399d08f | |
Brand impersonation: Adobe (QR code) | 3mo ago Oct 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-adobe-qr-code-2fc36c6d | |
Brand impersonation: Microsoft (QR code) | 3mo ago Sep 22nd, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-qr-code-ed0f772a | |
Attachment: Fake scan-to-email | 3mo ago Sep 22nd, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-fake-scan-to-email-ea850cc1 | |
Sharepoint link likely unrelated to sender | 3mo ago Sep 19th, 2025 | Sublime Security | /feeds/core/detection-rules/sharepoint-link-likely-unrelated-to-sender-6870f489 | |
Attachment: Suspicious PDF created with headless browser | 3mo ago Sep 17th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-suspicious-pdf-created-with-headless-browser-8f3108d7 | |
Credential phishing: Tax form impersonation with payment request | 3mo ago Sep 10th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-tax-form-impersonation-with-payment-request-717695cf | |
Attachment: Fictitious invoice using LinkedIn's address | 4mo ago Sep 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-fictitious-invoice-using-linkedins-address-aeee3d9f |