








Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Service abuse: Formester with suspicious link behavior | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-formester-with-suspicious-link-behavior-e4b74fd4 | |
Brand impersonation: Google Drive fake file share | 14d ago Dec 19th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-google-drive-fake-file-share-b424a941 | |
Fake voicemail notification (untrusted sender) | 15d ago Dec 18th, 2025 | Sublime Security | /feeds/core/detection-rules/fake-voicemail-notification-untrusted-sender-74ba7787 | |
Service abuse: Monday.com infrastructure with phishing intent | 15d ago Dec 18th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-mondaycom-infrastructure-with-phishing-intent-a346e3b1 | |
Service abuse: Google application integration redirecting to suspicious hosts | 16d ago Dec 17th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-google-application-integration-redirecting-to-suspicious-hosts-473d3247 | |
Credential phishing content and link (untrusted sender) | 16d ago Dec 17th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-content-and-link-untrusted-sender-f0c95bb7 | |
Self-sent fake PDF attachment with misleading link | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/self-sent-fake-pdf-attachment-with-misleading-link-8a285d2e | |
Link: Mamba 2FA phishing kit | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/link-mamba-2fa-phishing-kit-8d527c0f | |
Salesforce infrastructure abuse | 17d ago Dec 16th, 2025 | Sublime Security | /feeds/core/detection-rules/salesforce-infrastructure-abuse-78a77c70 | |
Credential phishing: Suspicious e-sign agreement document notification | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-e-sign-agreement-document-notification-9b68c2d8 | |
Brand impersonation: Microsoft Teams invitation | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-teams-invitation-46410ad8 | |
Deceptive Dropbox mention | 18d ago Dec 15th, 2025 | Sublime Security | /feeds/core/detection-rules/deceptive-dropbox-mention-58a107bc | |
Credential phishing: Engaging language and other indicators (untrusted sender) | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-engaging-language-and-other-indicators-untrusted-sender-c2bc8ca2 | |
Attachment: Adobe image lure in body or attachment with suspicious link | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-adobe-image-lure-in-body-or-attachment-with-suspicious-link-1d7add81 | |
QR Code with suspicious indicators | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/qr-code-with-suspicious-indicators-04f5c34f | |
Service abuse: Callback phishing via Microsoft Teams invite | 21d ago Dec 12th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-callback-phishing-via-microsoft-teams-invite-13e35e5f | |
Link: Self-sender with sender org in subject and credential theft indicator | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/link-self-sender-with-sender-org-in-subject-and-credential-theft-indicator-bfa9aa08 | |
Link: Base64 encoded recipient address in URL fragment with subject hash | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/link-base64-encoded-recipient-address-in-url-fragment-with-subject-hash-eb9694b8 | |
Google presentation open redirect phishing | 22d ago Dec 11th, 2025 | Sublime Security | /feeds/core/detection-rules/google-presentation-open-redirect-phishing-5d01ee3a | |
Brand impersonation: Microsoft with low reputation links | 23d ago Dec 10th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6 |