sublime_sec Profile Banner
Sublime Security Profile
Sublime Security

@sublime_sec

Followers
2K
Following
517
Media
131
Statuses
337

Sublime Security is the adaptive, AI-powered cloud email security platform that combines best-in-class effectiveness with unprecedented visibility and control.

Joined June 2018
Don't wanna be here? Send us removal request.
@sublime_sec
Sublime Security
8 months
We’re thrilled to announce our $60M series B to build the new standard for email security! ✉️ 🚀. Thank you to our customers, community, partners, and investors for trusting us. We could not be more excited to build the future of email security with you. Founder & CEO @jkamdjou
Tweet media one
5
1
30
@sublime_sec
Sublime Security
19 hours
Headed to #BlackHat? Come see how Sublime is redefining email defense. 🛡️ Booth #3246 – Meet the team & grab swag.🤖 Catch our talk: Machine vs. Machine.💬 Book a 1:1 with our founders.Modern threats demand a modern defense. 🔗
Tweet media one
0
1
1
@sublime_sec
Sublime Security
6 days
AutoIT-based malware attacks are not slowing down. In a recent campaign, bad actors sent emails to German speakers that promised explicit videos, but delivered a malicious AutoIT loader. Learn about the attack and the evasions it used, like anti-analysis techniques and the
Tweet media one
0
6
6
@sublime_sec
Sublime Security
7 days
🎯 Detecting Scattered Spider: Tactics, Techniques, and Email Defense Strategies. We're hosting a webinar to examine Scattered Spider's evolving TTPs, with particular focus on email-centric attacks. July 31 @ 12pm ET / 9am PT. Register here:
Tweet media one
0
1
2
@sublime_sec
Sublime Security
13 days
Attacks using Zoom Docs to impersonate brands are on the rise. We recently detected a credential phishing attack targeting Xfinity accounts that used Zoom Docs to impersonate Xfinity branding. Learn about the attack and its detection signals:
Tweet media one
0
0
3
@sublime_sec
Sublime Security
27 days
Zoom is the latest trusted service bad actors are exploiting to deliver malicious messages. In this recent attack, Zoom Events and Zoom Docs are used to deliver an adversary in the middle (AITM) credential phishing payload with a fake Microsoft login page:
Tweet media one
0
2
3
@sublime_sec
Sublime Security
1 month
In Q1 2025, our research data showed X (formerly Twitter) to be the third-most abused service for email attacks. Learn about a recent credential phishing attack in which a bad actor used the X link shortener (t[.]co) to try to hide a malicious URL:
Tweet media one
0
1
6
@sublime_sec
Sublime Security
1 month
At Sublime, we don’t just build powerful detection tools 📷 — we empower the community to use them. Over the years, our users have created, tested, and contributed some incredible custom rules to our Core Feed. Today, we’re spotlighting a few standouts from the Sublime Community
Tweet media one
0
5
14
@sublime_sec
Sublime Security
2 months
We’ve been seeing lapsed legitimate domains get purchased by bad actors and used to evade detection. In a recent attack, a domain that once belonged to a law firm was used to deliver a credential phishing payload that featured multiple evasion detection techniques. Learn more:
Tweet media one
0
2
11
@sublime_sec
Sublime Security
2 months
What you'll learn:.🔹 Why legacy email security falls short and what to do instead.🔹 How to streamline detection, investigation, and response workflows.🔹 Real-world examples of flexible, precision-based email defense.
0
0
1
@sublime_sec
Sublime Security
2 months
Attackers are using GenAI to launch faster, more evasive phishing campaigns - especially in highly targeted industries. Traditional tools can’t keep pace. Join us on June 23 at 12pm ET / 9am PT for a practical discussion on how teams are rethinking email security in today’s
Tweet media one
1
1
8
@sublime_sec
Sublime Security
2 months
We’re honored to be named to @redpoint’s 2025 #InfraRed100, spotlighting the most transformative infrastructure companies!. Big thanks to the team at @Redpoint congrats to our fellow innovators. →
Tweet media one
0
2
5
@sublime_sec
Sublime Security
2 months
Big thank you to @TechAnnouncer for including Sublime in their list of 5 cybersecurity startups “blowing up right now.”. We’re rethinking how defenders detect and respond to email threats—with a modular platform built for openness, customization, and control. Read more:.
0
0
5
@sublime_sec
Sublime Security
2 months
Big news: Sublime Security was named a Rising in Cyber 2025 honoree by @notablecap!. Recognized at the @NYSE and voted on by nearly 150 CISOs & security leaders. Proud to be building the future of email security with precision + transparency. 🔗
1
9
33
@sublime_sec
Sublime Security
2 months
ClickFix attacks have been on the rise and now we’re seeing it used to deliver DCRat malware. Learn about this attack that uses JavaScript to silently copy a malicious command to a target’s clipboard and then provides fake “verification” steps to run the command:
Tweet media one
0
2
6
@sublime_sec
Sublime Security
3 months
Our ML team built an agentic AI analyst capable of performing almost all of the same tasks as a human email security analyst. We introduced ASA a few weeks back, now we want to give you a peek under the hood. Learn about our approach to building our Autonomous Security Analyst:
Tweet media one
0
5
16
@sublime_sec
Sublime Security
3 months
We’ve seen an increase in attackers delivering ScreenConnect as a malicious payload. Often, it was delivered via a linked Canva file with the payload disguised as a legitimate PDF download. These attacks are multi-layered and designed to evade security controls. Learn more:
Tweet media one
2
11
12
@sublime_sec
Sublime Security
3 months
We are frequently seeing new services being abused in Living Off Trusts Sites (LOTS) attacks. In a recent attack, a bad actor tried to evade detection by putting a malicious payload in a linked Figma file delivered from a compromised vendor account. Learn about the attack:
Tweet media one
0
3
8
@sublime_sec
Sublime Security
3 months
BEC and related social engineering attacks continue to represent the highest financial cybercrime risk to most organizations. This attack type sees a wide variety of tactics and techniques.
Tweet media one
1
0
2
@sublime_sec
Sublime Security
3 months
Living off Trusted Services (LOTS) attacks now account for 8% all attacks. Within our telemetry, we found that these were the most frequently abused services:
Tweet media one
1
0
1