Sublime Security is the adaptive, AI-powered cloud email security platform that combines best-in-class effectiveness with unprecedented visibility and control.sublime.securityJoined June 2018
We recently saw an adversary use a bank's online "Request a Meeting" form to smuggle callback phishing language into a meeting confirmation email, which was sent automatically to a distribution list that relayed the attack to a large set of targets. Simple, effective, detected:…
Introducing email bomb protection from Sublime: a powerful solution for automatically detecting, remediating, and triaging email bombs. In these attacks, an adversary will send hundreds or thousands of emails at once to flood an inbox and obfuscate the malicious intent. Learn how…
We’ve had tons of questions about how NLU 3.0 works. Our ML team shares the blueprint: multi-headed architecture + advanced synthetic training—and why it removes throttles and ceilings. Give it a read and drop your questions for the team: sublime.security/blog/technical…
🎰 Black Hat USA, BSides LV, and DEF CON 33 were an exciting time in Vegas. It was great seeing old friends and learning about new security practices, and it was interesting to see familiar patterns reemerge in new ways. Read about a few trends Sublime CISO Andrew Becherer…
🚀 NLU 3.0 has been deployed in the Sublime platform and is automatically available to all users – no manual updates necessary. Learn about this major model upgrade that's built for speed and accuracy in the face of rapidly evolving, AI-powered attacks and evasive edge cases:…
Final day of the @BlackHatEvents business hall!
Walk with us to Booth #3246 🎥
✅ Meet the team
🎮 Play Email Defenders
🏆 Last shot at prizes
🛡️ See what next-gen email security looks like
Catch us at #BSidesLV!
Join us for Happy Hour today (4–5PM PT) at Middle Ground
🍻Drinks, bites & exclusive swag
Then on Tues @ 6PM:
🧷 Brian Baskin presents: The Hacker’s Guide to Sticker Preservation — a look into infosec history through laptop art
Details 👉…
We’re increasingly seeing legit remote monitoring tools being repurposed as malware. In a recent attack, we saw a bad actor deliver 2 different RMMs in 1 payload – one with an interactive installer and the other silently in the background. Learn about this sneaky attack:…
You heard it from the boss. 👀
Our #defcon limited edition swag drop is back next week. Follow us for drop locations as they’re announced.
Don’t sleep on this one. 🕵️♂️
You heard it from the boss. 👀
Our #defcon limited edition swag drop is back next week. Follow us for drop locations as they’re announced.
Don’t sleep on this one. 🕵️♂️
Headed to #BlackHat? Come see how Sublime is redefining email defense.
🛡️ Booth #3246 – Meet the team & grab swag
🤖 Catch our talk: Machine vs. Machine
💬 Book a 1:1 with our founders
Modern threats demand a modern defense.
🔗 sublime.security/events/black-h…
AutoIT-based malware attacks are not slowing down. In a recent campaign, bad actors sent emails to German speakers that promised explicit videos, but delivered a malicious AutoIT loader. Learn about the attack and the evasions it used, like anti-analysis techniques and the…
Attacks using Zoom Docs to impersonate brands are on the rise. We recently detected a credential phishing attack targeting Xfinity accounts that used Zoom Docs to impersonate Xfinity branding. Learn about the attack and its detection signals: sublime.security/blog/phishing-…
Zoom is the latest trusted service bad actors are exploiting to deliver malicious messages. In this recent attack, Zoom Events and Zoom Docs are used to deliver an adversary in the middle (AITM) credential phishing payload with a fake Microsoft login page: sublime.security/blog/living-of…
In Q1 2025, our research data showed X (formerly Twitter) to be the third-most abused service for email attacks. Learn about a recent credential phishing attack in which a bad actor used the X link shortener (t[.]co) to try to hide a malicious URL: sublime.security/blog/using-the…
At Sublime, we don’t just build powerful detection tools 📷 — we empower the community to use them. Over the years, our users have created, tested, and contributed some incredible custom rules to our Core Feed.
Today, we’re spotlighting a few standouts from the Sublime Community…
16K Followers 2K FollowingTargeted Ops Red Team @ TrustedSec | Hacking since Renegade BBS backdoors | Prior CrowdStrike/BHIS | In Christ's grip | I speak for myself only | K1HAQ
42K Followers 2K Following#infosec engineer | all things gaming | void hunter | will shitpost | i like to lift weights & play piano | los angeleno currently in twin cities | fight on✌️
92 Followers 133 FollowingBig baller no buckets. What Big Mike says goes. Ex-Twitter vet on a comeback tour. Your Mom’s favorite friend. Steak savant. #RateMyMeat #TrueSonMIZ #STL #Bills
430 Followers 469 FollowingFull-stack code junkie in the industry for 15+ years. My security background gives me a unique perspective. My passion for learning new things fuels me.
532 Followers 222 FollowingIn pursuit of finding peace from mind.
Head of Design @sublime_sec — Previously cofounded @KinHabits and led design at @AltoPharmacy & @CoatueMGMT
2K Followers 747 FollowingThe workflow and AI orchestration platform loved by security-minded teams.
Try our always-free Community Edition. https://t.co/1od0fSLxkA
6K Followers 545 FollowingI post mostly about Security Onion and OhMyDebn. Believer, husband, father, Founder and CEO of Security Onion Solutions, Co-founder of BSidesAugusta.
9K Followers 129 FollowingStrengthening trust and safety across the Internet, by being the authority on IP and domain reputation.
Mastodon: @[email protected]
809 Followers 3 FollowingEmailRep analyzes and predicts the relative risk of an email address. Use EmailRep to identify phishing attacks or fraudulent accounts. Run by @sublime_sec