








Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Link: Figma design deck with credential theft language | 13h ago Mar 4th, 2026 | Sublime Security | /feeds/core/detection-rules/link-figma-design-deck-with-credential-theft-language-87601924 | |
Link: Apple App Store link to apps impersonating AI adveristing | 20h ago Mar 4th, 2026 | Sublime Security | /feeds/core/detection-rules/link-apple-app-store-link-to-apps-impersonating-ai-adveristing-19b556e6 | |
Attachment: PDF with recipient email in link | 2d ago Mar 3rd, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-recipient-email-in-link-0399d08f | |
Link: Direct download of executable file | 3d ago Mar 2nd, 2026 | Sublime Security | /feeds/core/detection-rules/link-direct-download-of-executable-file-dbbfd077 | |
Link: Google Forms link with credential theft language | 3d ago Mar 2nd, 2026 | Sublime Security | /feeds/core/detection-rules/link-google-forms-link-with-credential-theft-language-0cad40e2 | |
Attachment: PDF with a suspicious string and single URL | 3d ago Mar 2nd, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-a-suspicious-string-and-single-url-3bdbb7ad | |
Link: SharePoint OneNote or PDF link with self sender behavior | 6d ago Feb 27th, 2026 | Sublime Security | /feeds/core/detection-rules/link-sharepoint-onenote-or-pdf-link-with-self-sender-behavior-588e7203 | |
Link: Multistage landing - ClickUp abuse | 6d ago Feb 27th, 2026 | Sublime Security | /feeds/core/detection-rules/link-multistage-landing-clickup-abuse-78a5d035 | |
Attachment: PDF with suspicious link and action-oriented language | 6d ago Feb 27th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-suspicious-link-and-action-oriented-language-816d33a0 | |
Attachment: PDF with multistage landing - ClickUp abuse | 6d ago Feb 27th, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-pdf-with-multistage-landing-clickup-abuse-0dc40316 | |
Link: JavaScript obfuscation with Telegram bot integration | 8d ago Feb 25th, 2026 | Sublime Security | /feeds/core/detection-rules/link-javascript-obfuscation-with-telegram-bot-integration-032a4485 | |
Brand impersonation: DocuSign | 9d ago Feb 24th, 2026 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-docusign-4d29235c | |
Link: URL redirecting to blob URL | 9d ago Feb 24th, 2026 | Sublime Security | /feeds/core/detection-rules/link-url-redirecting-to-blob-url-1677135b | |
Link: Free file hosting with undisclosed recipients | 10d ago Feb 23rd, 2026 | Sublime Security | /feeds/core/detection-rules/link-free-file-hosting-with-undisclosed-recipients-b6281306 | |
Tax Form: W-8BEN solicitation | 10d ago Feb 23rd, 2026 | Sublime Security | /feeds/core/detection-rules/tax-form-w-8ben-solicitation-a64edb69 | |
Reconnaissance: Email address harvesting attempt | 10d ago Feb 23rd, 2026 | Sublime Security | /feeds/core/detection-rules/reconnaissance-email-address-harvesting-attempt-bb31efbc | |
Attachment: QR code with recipient targeting and special characters | 12d ago Feb 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09 | |
Link: Suspicious URL with recipient targeting and special characters | 12d ago Feb 21st, 2026 | Sublime Security | /feeds/core/detection-rules/link-suspicious-url-with-recipient-targeting-and-special-characters-e808be3a | |
Attachment: QR code with suspicious URL patterns in EML file | 12d ago Feb 21st, 2026 | Sublime Security | /feeds/core/detection-rules/attachment-qr-code-with-suspicious-url-patterns-in-eml-file-2289acd5 | |
Cloud storage impersonation with credential theft indicators | 13d ago Feb 20th, 2026 | Sublime Security | /feeds/core/detection-rules/cloud-storage-impersonation-with-credential-theft-indicators-4c20f72c |