Link: Base64 encoded recipient address in URL fragment with hex subdomain
Link: Base64 encoded recipient address in URL fragment with subject hash
Link: Breely link masquerading as PDF
Link: chatbot.page platform abuse
Link: Cloud service with credential theft language
Link: Credential phishing traversing Russian infrastructure
Link: Credential theft with invisible Unicode character in page title from unsolicited sender
Link: Cryptocurrency fraud with suspicious links
Link: Direct link to limewire hosted file
Link: Direct POWR.io Form Builder with suspicious patterns
Link: Display text matches subject line
Link: Display text with excessive right-to-left mark characters
Link: Excessive URL rewrite encoders
Link: Executable file download with suspicious message content
Link: File sharing impersonation with suspicious language and sending patterns
Link: File sharing pretext with suspicious body and link
Link: Financial account issue with suspicious indicators
Link: Google Calendar invite linking to an open redirect from an untrusted freemail sender
Link: HR impersonation with suspicious domain indicators and credential theft
Link: /index.php enclosed in three asterisks
Link: Intuit link abuse with file share context
Link: Invoice or receipt from freemail sender with customer service number
Link: IPv4-mapped IPv6 address obfuscation
Link: JavaScript obfuscation with Telegram bot integration
Link: Jensi file preview link from unsolicited sender
Link: Job recruitment lure from unsolicited sender with suspicious hosting
Link: Microsoft device code authentication with suspicious indicators
Link: Microsoft Dynamics 365 form phishing
Link: Microsoft impersonation using hosted png with suspicious link
Link: Microsoft protected message with matching sender and recipient addresses
Link: Mixed case HTTPS protocol
Link: Multiple HTTP protocols in single URL
Link: Multistage landing - Abused Adobe frame.io
Link: Multistage landing - Abused Docusign
Link: Multistage landing - Abused Google Drive
Link: Multistage landing - ClickUp abuse
Link: Multistage landing - FreshDesk knowledge base abuse
Link: Multistage landing - JotForm abuse
Link: Multistage landing - Microsoft Forms abuse
Link: Multistage landing - Trello board abuse
Link: Obfuscation via userinfo with suspicious indicators
Link: PDF and financial display text to free file host
Link: PDF display text with fake copyright claim template
Link: PDF filename impersonation with credential theft language
Link: Personal SharePoint with invalid recipients and credential theft language
Link: QR code in EML attachment with credential phishing indicators
Link: QR code with phishing disposition in img or pdf
Link: QR Code with suspicious language (untrusted sender)
Link: Recipient email address in 'eta' parameter
Link: RFI document reference pattern in display text