|
Everything old is new again: 3 trends from Black Hat USA, BSides …
|
Andrew Becherer |
2025-08-18 |
832 |
--
|
|
Key findings from the Q1 2025 Sublime Email Threat Research Report
|
Machine Learning Team |
2025-04-28 |
580 |
--
|
|
Tycoon 2FA credential phishing with cloned internal employee login
|
Peter Djordjevic |
2025-03-27 |
702 |
--
|
|
Direct Send abuse on Microsoft 365: Just another failed authentication
|
Peter Djordjevic |
2025-10-23 |
1,629 |
--
|
|
Microsoft OAuth URL used as redirect to AITM credential phishing site
|
Brandon Murphy |
2025-03-20 |
632 |
--
|
|
Email bomb detection and prevention with Sublime
|
Dr. Anna Bertiger |
2025-08-28 |
855 |
--
|
|
Detecting an email-based ClickFix attack that delivers DCRat malware payload
|
Josh "Soup" Campbell |
2025-05-29 |
898 |
--
|
|
Hiding a $50,000 BEC financial fraud in a fake email thread
|
Sam Scholten |
2025-01-07 |
825 |
--
|
|
Tax season email attacks: AdWind RATs and Tycoon 2FA phishing kits
|
Brandon Webster |
2025-02-18 |
1,326 |
--
|
|
How ASA thinks: The technical architecture of Sublime's Autonomous Security Analyst
|
Aryan Luthra |
2025-05-15 |
1,573 |
--
|
|
5 email security trends from 2025
|
Brian Baskin |
2025-12-29 |
785 |
--
|
|
Figma abuse from compromised vendor used in credential theft attack
|
Sam Scholten |
2025-04-30 |
475 |
--
|
|
Sublime NLU 3.0: Faster, more accurate, future-proof defense against AI email attacks
|
Aryan Luthra |
2025-08-13 |
905 |
--
|
|
You've been invited to join a Meta for Business scam!
|
Luke Wescott |
2025-11-21 |
872 |
--
|
|
Elastic + Sublime: Adding email to your security and observability stack
|
AJ Williams |
2025-04-17 |
749 |
--
|
|
Introducing ASA: The Autonomous Security Analyst for email
|
AJ Williams |
2025-04-23 |
536 |
--
|
|
ICS phishing: Stopping a surge of malicious calendar invites
|
Ahry Jeon |
2025-11-03 |
1,131 |
--
|
|
Who are you trying to April Fool with that email scam?
|
Threat Detection Team |
2025-04-01 |
627 |
--
|
|
Seeing both sides of a service abuse financial fraud using YOPmail disposable …
|
Josh "Soup" Campbell |
2025-03-13 |
659 |
--
|
|
Community Spotlight: Email Detection Rules built by the Sublime Community
|
Threat Detection Team |
2025-06-18 |
760 |
--
|
|
AITM phishing with Russian infrastructure and detection evasion from a lapsed domain
|
Brandon Murphy |
2025-06-12 |
3,134 |
--
|
|
Callback phishing with online appointment abuse and distribution lists
|
Brandon Webster |
2025-09-04 |
727 |
--
|
|
Sublime raises $150M Series C to arm defenders for the post-LLM world
|
Josh Kamdjou |
2025-10-28 |
346 |
--
|
|
Salesforce infrastructure abuse: Stopping email scams and spam sent via SFDC
|
Brandon Murphy |
2025-11-13 |
1,011 |
--
|
|
Enhanced message groups: Improving efficiency in email incident response
|
AJ Williams |
2025-01-24 |
918 |
--
|
|
Google Careers impersonation credential phishing scam with endless variation
|
Brandon Murphy |
2025-10-14 |
1,261 |
--
|
|
Email Topic Modeling: Simplifying detection with ML-powered granularity
|
Aryan Luthra |
2025-02-07 |
992 |
--
|
|
TROX Stealer: A deep dive into a new Malware as a Service …
|
Threat Research Team |
2025-04-10 |
2,586 |
--
|
|
Scripting Vector Grifts: SVG phishing with smuggled JS and adversary in the …
|
Brandon Murphy |
2025-02-25 |
742 |
--
|
|
Keitaro TDS abused to deliver AutoIT-based loader targeting German speakers
|
Bryan Campbell |
2025-07-24 |
1,532 |
--
|
|
UK Home Office visa & immigration scam targets Sponsor Management System accounts
|
Bryan Campbell |
2025-10-08 |
974 |
--
|
|
Living Off Trusted Sites: Zoom service abuse to deliver credential phishing attack
|
Josh "Soup" Campbell |
2025-07-02 |
521 |
--
|
|
Facebook credential phishing with job scams impersonating well-known companies
|
Bryan Campbell |
2025-10-16 |
651 |
--
|
|
Evolving our brand as Sublime grows
|
Omar Jalalzada |
2025-12-16 |
849 |
--
|
|
ScreenConnect as malware via Canva abuse and Docusign impersonation
|
Brian Baskin |
2025-05-08 |
1,527 |
--
|
|
How to build fast similarity search for email from the ground up
|
Ross Wolf |
2025-12-18 |
2,932 |
--
|
|
Welcoming Andrew Becherer as Sublime's CISO
|
Josh Kamdjou |
2025-04-21 |
311 |
--
|
|
Phishing for Xfinity credentials with malicious Zoom Docs
|
Brandon Webster |
2025-07-17 |
549 |
--
|
|
Sublime's AI agents are just the tip of the platform
|
Aryan Luthra |
2025-12-04 |
1,460 |
--
|
|
Credential phishing Charles Schwab account holders with 2FA bypass
|
Aiden Mitchell |
2025-01-29 |
417 |
--
|
|
More than "plausible nonsense": A rigorous eval for ADÃ, our security coding …
|
Bobby Filar |
2025-09-25 |
1,673 |
--
|
|
Fake Meta Ads Manager in App Store and TestFlight used to phish …
|
Brandon Webster |
2025-09-23 |
816 |
--
|
|
$500K financial fraud built on BEC, a domain lookalike, and a fake …
|
Sam Scholten |
2025-04-03 |
687 |
--
|
|
Using the X/Twitter link shortener (t.co) to hide an AITM credential phishing …
|
Brandon Webster |
2025-06-25 |
504 |
--
|
|
Multi-RMM attack: Splashtop Streamer and Atera payloads delivered via Discord CDN link
|
Josh "Soup" Campbell |
2025-07-31 |
600 |
--
|
|
Automatic malicious calendar event remediation
|
Ahry Jeon |
2025-12-09 |
368 |
--
|
|
Technical deep dive of NLU 3.0: Modular, multi-headed, with advanced synthetic training
|
Stefano Meschiari |
2025-08-26 |
959 |
--
|
|
Impersonated Evite and Punchbowl invitations used for credential phishing and malware distribution
|
Brandon Webster |
2025-10-02 |
1,071 |
--
|
|
Meet ADÃ: The Autonomous Detection Engineer for email
|
AJ Williams |
2025-09-11 |
655 |
--
|
|
Base64-encoding an SVG attack within an iframe and hiding it all in …
|
Sam Scholten |
2025-03-06 |
848 |
--
|
|
HostPapa abuse treasure trove discovered in GoDaddy email threat hunt
|
Peter Djordjevic |
2026-01-06 |
1,399 |
--
|
|
How we built a load testing framework for email security at scale
|
Clifton Kaznocha |
2026-01-15 |
1,777 |
--
|
|
Key findings from the 2026 Sublime Email Threat Research Report
|
Brian Baskin |
2026-01-21 |
1,103 |
--
|
|
Email attacks featuring Google Cloud Application Integration abuse and captcha.html
|
Aiden Mitchell |
2026-01-29 |
958 |
--
|
|
Scammers actively targeting real estate agents with remote access attacks
|
Kyle Eaton |
2026-02-05 |
698 |
--
|
|
ASA expanded: Eliminate review queue bottlenecks with AI agent coverage of flagged …
|
AJ Williams |
2026-02-12 |
564 |
--
|
|
Fake Google Meet invitation, fake Microsoft Store, real malware attack
|
Montel Oliver |
2026-02-19 |
624 |
--
|
|
Enhanced reporting and analytics provide complete visibility into email security
|
Art Chavez |
2026-02-24 |
334 |
--
|
|
How we built high speed threat hunting for email security
|
Hugh Oh |
2026-03-03 |
2,397 |
--
|
|
Announcing Sublime Email DLP: Data loss prevention at the outbox
|
Kevin Gough |
2026-03-10 |
660 |
--
|
|
Advanced fake Zoom installer used for delivering malware
|
Kyle Eaton |
2026-03-18 |
820 |
--
|
|
ADÉ is now generally available: New coverage for novel threats, autonomously
|
-- |
2026-03-25 |
953 |
--
|
|
Sublime earns 14 Enterprise G2 badges for Spring 2026
|
-- |
2026-03-27 |
1,182 |
--
|
|
Phishing incident response: A guide for organizations
|
-- |
2026-04-01 |
1,263 |
--
|
|
QR code phishing attacks: Risks and prevention strategies
|
-- |
2026-04-01 |
1,542 |
--
|
|
17 types of phishing attacks and how to spot them
|
-- |
2026-04-01 |
1,758 |
--
|
|
Email impersonation protection: How to spot and stop attacks
|
-- |
2026-04-01 |
1,654 |
--
|
|
Email triage: What it is, strategies, and methods for security
|
-- |
2026-04-01 |
1,660 |
--
|
|
What is malspam? Key characteristics, examples, and how to stop it
|
-- |
2026-04-01 |
1,511 |
--
|
|
AI phishing attacks: Everything businesses should know
|
-- |
2026-04-01 |
2,110 |
--
|
|
Sublime at RSAC 2026: Top questions at the booth
|
-- |
2026-04-01 |
1,573 |
--
|
|
Top 12 email security companies for 2026
|
-- |
2026-04-01 |
1,651 |
--
|
|
April Fools' 2026: A good worker never blames their AI tools
|
-- |
2026-04-01 |
1,183 |
--
|
|
Email spoofing protection: Methods, tools, and prevention steps
|
-- |
2026-04-01 |
1,614 |
--
|
|
Top phishing protection software in 2026
|
-- |
2026-04-01 |
1,761 |
--
|
|
What is phishing in cybersecurity? Definition, examples, and how to stop it
|
-- |
2026-04-01 |
1,474 |
--
|
|
10 email security best practices to protect users and data
|
-- |
2026-04-01 |
1,315 |
--
|
|
Top 8 Mimecast alternatives for 2026 for modern email security teams
|
-- |
2026-04-01 |
1,941 |
--
|
|
BEC tools: The 3 techniques most commonly used in BEC attacks
|
-- |
2026-04-01 |
1,461 |
--
|
|
8 best Abnormal Security alternatives
|
-- |
2026-04-01 |
1,411 |
--
|
|
10 best Proofpoint alternatives for 2026
|
-- |
2026-04-01 |
1,511 |
--
|
|
What is email security? Complete 2026 guide to threats and solutions
|
-- |
2026-04-01 |
1,401 |
--
|
|
How Snyk uses Sublime's AI agents to stay ahead of email threats
|
-- |
2026-04-08 |
1,283 |
--
|
|
How Sublime's AI agents are secure by design
|
-- |
2026-04-10 |
1,808 |
--
|