Attachment: EML file contains HTML attachment with login portal indicators
Attachment: EML with embedded Javascript in SVG file
Attachment: File execution via Javascript
Attachment: HTML attachment with Javascript location
Attachment: HTML attachment with login portal indicators
Attachment: HTML file with reference to recipient and suspicious patterns
Attachment: HTML smuggling Microsoft sign in
Attachment: HTML smuggling with atob and high entropy
Attachment: HTML smuggling with atob and high entropy via calendar invite
Attachment: HTML smuggling with auto-downloaded file
Attachment: HTML smuggling with base64 encoded JavaScript function
Attachment: HTML smuggling with base64 encoded ZIP file
Attachment: HTML smuggling with eval and atob
Attachment: HTML smuggling with eval and atob via calendar invite
Attachment: HTML smuggling with excessive line break obfuscation
Attachment: HTML smuggling with excessive string concatenation and suspicious patterns
Attachment: HTML smuggling with fromCharCode and other signals
Attachment: HTML smuggling with hex strings
Attachment: HTML smuggling with raw array buffer
Attachment: HTML smuggling with RC4 decryption
Attachment: HTML smuggling with ROT13
Attachment: HTML smuggling with setTimeout
Attachment: HTML smuggling with unescape
Attachment: HTML with emoji-to-character map
Attachment: HTML with JavaScript functions for HTTP requests
Attachment: HTML with obfuscation and recipient's email in JavaScript strings
Attachment: ICS with embedded Javascript in SVG file
Link: chatbot.page platform abuse
Link: Cryptocurrency fraud with suspicious links
Link: JavaScript obfuscation with Telegram bot integration
Link: Multistage landing - JotForm abuse
Low reputation link to auto-downloaded HTML file with smuggling indicators
Request for Quote or Purchase (RFQ|RFP) with HTML smuggling attachment