Report

Sublime Email Threat Research Report 2026

Insights and trends from 2025 including the rise of thread hijacking, QR code explosion, and the numbers around ICS phishing, email bombs, and opportunistic service abuse.

Report

Sublime Email Threat Research Report 2026

Insights and trends from 2025 including the rise of thread hijacking, QR code explosion, and the numbers around ICS phishing, email bombs, and opportunistic service abuse.

Download the report

What’s in the 2026 report

This report looks back at 2025, examining how email-based threats have evolved throughout the year across organizations of all sizes. Our analysis highlights several trends that security practitioners should be aware of to maintain effective defenses. Sections include:

  1. Continued evolution of BEC and social engineering
  2. Threat uniqueness and customization
  3. Evasion techniques by attack type
  4. Evasion stacking
  5. Getting hot: Opportunistic LOTS, ICS phishing, email bombs
  6. Recommendations for 2026

What’s in the 2026 report

This report looks back at 2025, examining how email-based threats have evolved throughout the year across organizations of all sizes. Our analysis highlights several trends that security practitioners should be aware of to maintain effective defenses. Sections include:

  1. Continued evolution of BEC and social engineering
  2. Threat uniqueness and customization
  3. Evasion techniques by attack type
  4. Evasion stacking
  5. Getting hot: Opportunistic LOTS, ICS phishing, email bombs
  6. Recommendations for 2026

Blog

Article

Sublime Email Threat Research Report 2026

Report

Trusted by leading security teams
CompassSpotifyBentlerBrexelasticSnowflakeenergySentinelOnerampred canaryzscalercentricaGenetecSynkCriblAnduril

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern