Brand impersonation: Square
Brand impersonation: TikTok
Brand impersonation: Toronto-Dominion Bank
Brand impersonation: USPS
Brand impersonation: Zoom
Callback phishing via Adobe Sign comment
Callback phishing via DocuSign comment
Callback phishing via e-signature service
Callback phishing via Intuit service abuse
Callback Phishing via Signable E-Signature Request
Callback phishing via SignFree e-signature request
Callback phishing via Xodo Sign comment
Callback phishing via Zoho service abuse
Callback Phishing via Zoom comment
Cloud storage impersonation with credential theft indicators
Compensation review with QR code in attached EML
Credential phishing content and link (untrusted sender)
Credential phishing: DocuSign embedded image lure with no DocuSign domains in links
Credential phishing: Image as content, short or no body contents
Credential phishing link (unknown sender)
Credential Phishing via Dropbox comment abuse
Extortion / sextortion in attachment from untrusted sender
Free subdomain link with login or captcha (untrusted sender)
Google Accelerated Mobile Pages (AMP) abuse
Google Drive abuse: Credential phishing link
Impersonation: Recipient organization in sender display name with credential theft image
Link: Credential phishing link with undisclosed recipients
Link: Credential phishing via WordPress
Link: Figma design deck with credential theft language
Link: HR impersonation with suspicious domain indicators and credential theft
Link: Multistage landing - Abused Adobe Acrobat hosted PDF
Link: Multistage landing - Abused Adobe frame.io
Link: Multistage landing - Ludus presentation
Link: Multistage landing - Scribd document
Link: QR code in EML attachment with credential phishing indicators
Link: QR code with phishing disposition in img or pdf
Link: QR Code with suspicious language (untrusted sender)
Link: QuickBooks image lure with suspicious link
Open Redirect: Google domain with /url path and suspicious indicators
QR Code with suspicious indicators
Service abuse: Formester with suspicious link behavior
Spam: Mastercard promotional content with image-based body
Suspicious invoice reference with missing or image-only attachments
Suspicious recipient pattern and language with low reputation link to login
Suspicious recipients pattern with no Compauth pass and suspicious content
X (Twitter) impersonation with credential phishing motives