Detection Method: Threat intelligence

Threat intelligence uses data feeds and insights about known and emerging phishing threats to give you proactive protection against attackers. This method taps into massive databases of indicators of compromise (IoCs), helping your security systems recognize patterns, techniques, and infrastructure that have been seen in past attacks.
Threat intelligence can help you identify:
  • Domains and URLs linked to previous phishing campaigns
  • File hashes associated with known malware samples
  • IP addresses connected to command and control servers
  • Email patterns that match identified threat actors
  • Emerging threats based on recently observed attack tactics
For example, when a new phishing campaign targeting a specific industry is discovered, threat intelligence feeds can share the indicators of that campaign, so you can block similar attempts before they even reach your users.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
MalwareBazaar: Malicious attachment hash (trusted reporters)
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/malwarebazaar-malicious-attachment-hash-trusted-reporters-5b5c9c3e
URLhaus: Malicious domain in message body or pdf attachment (trusted reporters)
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/urlhaus-malicious-domain-in-message-body-or-pdf-attachment-trusted-reporters-cfca2986
MalwareBazaar: Malicious attachment hash in archive (trusted reporters)
6mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/malwarebazaar-malicious-attachment-hash-in-archive-trusted-reporters-9d734281
Malware: Pikabot delivery via URL auto-download
2y ago
Apr 25th, 2024
Sublime Security
/feeds/core/detection-rules/malware-pikabot-delivery-via-url-auto-download-f4be4572
Brand impersonation: ukr[.]net
3y ago
Aug 21st, 2023
Sublime Security
/feeds/core/detection-rules/brand-impersonation-ukrnet-3cb4015f