








Rule Name & Severity | Last Updated | Author | Types, Tactics & Capabilities | |
|---|---|---|---|---|
Spam: Fake photo share | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/spam-fake-photo-share-eb086f7d | |
Brand impersonation: Microsoft with low reputation links | 4d ago Nov 8th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-microsoft-with-low-reputation-links-b59201b6 | |
Credential phishing: Suspicious e-sign agreement document notification | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-suspicious-e-sign-agreement-document-notification-9b68c2d8 | |
Brand impersonation: SharePoint PDF attachment with credential theft language | 5d ago Nov 7th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-pdf-attachment-with-credential-theft-language-ae3756fa | |
Brand impersonation: Paperless Post | 6d ago Nov 6th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-paperless-post-e9ec5e09 | |
Fake voicemail notification (untrusted sender) | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/fake-voicemail-notification-untrusted-sender-74ba7787 | |
Attachment: EML file with IPFS links | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-eml-file-with-ipfs-links-1fe9d7e7 | |
Attachment: HTML smuggling with atob and high entropy | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/attachment-html-smuggling-with-atob-and-high-entropy-03fcac11 | |
ClickFunnels link infrastructure abuse | 8d ago Nov 4th, 2025 | Sublime Security | /feeds/core/detection-rules/clickfunnels-link-infrastructure-abuse-9192fbe9 | |
Credential phishing: Generic document sharing | 9d ago Nov 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/credential-phishing-generic-document-sharing-9f0e1d2c | |
Xero infrastructure abuse | 9d ago Nov 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/xero-infrastructure-abuse-918c4bd3 | |
Spam/fraud: Predatory journal/research paper request | 9d ago Nov 3rd, 2025 | Sublime Security | /feeds/core/detection-rules/spamfraud-predatory-journalresearch-paper-request-263ca56b | |
Link: File sharing impersonation with suspicious language and sending patterns | 12d ago Oct 31st, 2025 | Sublime Security | /feeds/core/detection-rules/link-file-sharing-impersonation-with-suspicious-language-and-sending-patterns-d3363041 | |
Service abuse: FlipHTML5 with attachment deception and credential theft language | 13d ago Oct 30th, 2025 | Sublime Security | /feeds/core/detection-rules/service-abuse-fliphtml5-with-attachment-deception-and-credential-theft-language-02464799 | |
Link: Multiple HTTP protocols in single URL | 13d ago Oct 30th, 2025 | Sublime Security | /feeds/core/detection-rules/link-multiple-http-protocols-in-single-url-92f9d241 | |
Brand impersonation: DocuSign PDF attachment with suspicious link | 21d ago Oct 22nd, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-docusign-pdf-attachment-with-suspicious-link-2601cbb7 | |
Link: Apple TestFlight from free email provider | 26d ago Oct 17th, 2025 | Sublime Security | /feeds/core/detection-rules/link-apple-testflight-from-free-email-provider-9b447f1f | |
Link: Apple App Store malicious ad manager themed apps from free email provider | 26d ago Oct 17th, 2025 | Sublime Security | /feeds/core/detection-rules/link-apple-app-store-malicious-ad-manager-themed-apps-from-free-email-provider-9ce402c6 | |
Brand impersonation: Sharepoint fake file share | 26d ago Oct 17th, 2025 | Sublime Security | /feeds/core/detection-rules/brand-impersonation-sharepoint-fake-file-share-ff8b296b | |
Fake scan-to-email message | 26d ago Oct 17th, 2025 | Sublime Security | /feeds/core/detection-rules/fake-scan-to-email-message-78851fbe |