Brand impersonation: Fake DocuSign HTML table not linking to DocuSign domains
Brand impersonation: File sharing notification with template artifacts
Brand impersonation: Microsoft logo in HTML with fake quarantine release notification
Brand impersonation: Microsoft Teams invitation
Brand impersonation: Paperless Post
Brand impersonation: Zoom
Brand impersonation: Zoom via HTML styling
Callback phishing: AOL senders with suspicious HTML template or PDF attachment
Canva design with suspicious embedded link
Credential phishing: Blue button styled link with file-sharing template artifacts
Credential phishing: Suspicious e-sign agreement document notification
Credential Phishing: W-2 lure with inline SVG Windows logo
Credential theft: Gophish abuse with hidden tracking image
CVE-2023-5631 - Roundcube Webmail XSS via crafted SVG
Fake Zoho Sign template abuse
Google presentation open redirect phishing
Google share notification with suspicious comments
HTML: Bidirectional (BIDI) HTML override with right to left obfuscation
HTML smuggling with atob in message body
Image as content with a link to an open redirect (unsolicited)
Impersonation: Chrome Web Store policy
Inline image as message with attachment or link
Link: Abused Adobe Express
Link: Apple App Store link to apps impersonating AI adveristing
Link: chatbot.page platform abuse
Link: Common hidden directory observed
Link: Credential theft with invisible Unicode character in page title from unsolicited sender
Link: File sharing pretext with suspicious body and link
Link: Multistage landing - Abused Adobe frame.io
Link: Multistage landing - Abused Docusign
Link: Multistage landing - Abused Google Drive
Link: Multistage landing - JotForm abuse
Link: Multistage landing - Microsoft Forms abuse
Link: Multistage landing - Scribd document
Link: PDF display text with fake copyright claim template
Link: Suspicious Sharepoint folder share
Link: Tycoon2FA phishing kit (non-exhaustive)
Link: Uncommon SharePoint document type with sender's display name
Link: URL scheme obfuscation via split HTML anchors
Low reputation link to auto-downloaded HTML file with smuggling indicators
Open redirect: Shibboleth SSO Logout Return Parameter
Outlook hyperlink bypass: left-to-right mark (LRM) in base HTML tag
Potential prompt injection attack in body HTML
Request for Quote or Purchase (RFQ|RFP) with HTML smuggling attachment
Service abuse: Adobe Creative Cloud share from an unsolicited sender address
Service abuse: Apple TestFlight with suspicious developer reference
Service abuse: Google Firebase sender address with suspicious content
Service abuse: HelloSign from an unsolicited sender address
Service abuse: HungerRush domain with SendGrid tracking targeting ProtonMail
Service abuse: Meetup.com redirect with brand impersonation