Adobe branded PDF file linking to a password-protected file from untrusted sender
Attachment: Adobe image lure in body or attachment with suspicious link
Attachment: Callback phishing solicitation via image file
Attachment: Callback phishing solicitation via pdf file
Attachment: Compensation review lure with QR code
Attachment: Dropbox image lure with no Dropbox domains in links
Attachment: EML with link to credential phishing page
Attachment: Fake attachment image lure
Attachment: Fake lawyer & sports agent identities
Attachment: Fake scan-to-email
Attachment: Fake voicemail via PDF
Attachment: Fictitious invoice using LinkedIn's address
Attachment: Invoice and W-9 PDFs with suspicious creators
Attachment: Legal themed message or PDF with suspicious indicators
Attachment: Microsoft 365 credential phishing
Attachment: Office file with document sharing and browser instruction lures
Attachment: PDF bid/proposal lure with credential theft indicators
Attachment: PDF proposal with credential theft indicators
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
Attachment: PDF with suspicious language and redirect to suspicious file type
Attachment: RFP/RFQ impersonating government entities
Attachment: Soda PDF producer with encryption themes
Attachment soliciting user to enable macros
Attachment: Suspicious PDF created with headless browser
Attachment: USDA bid invitation impersonation
Brand impersonation: Amazon Web Services (AWS)
Brand impersonation: Amazon with suspicious attachment
Brand impersonation: DocuSign branded attachment lure with no DocuSign links
Brand impersonation: DocuSign PDF attachment with suspicious link
Brand impersonation: Fake Fax
Brand impersonation: Google fake sign-in warning
Brand impersonation: Internal Revenue Service
Brand impersonation: Microsoft quarantine release notification in image attachment
Brand impersonation: Microsoft Teams
Brand impersonation: Microsoft with low reputation links
Brand impersonation: SendGrid
Brand impersonation: SharePoint PDF attachment with credential theft language
Brand Impersonation: Shein
Brand impersonation: Square
Brand impersonation: TikTok
Brand impersonation: Toronto-Dominion Bank
Callback phishing: Branded invoice from sender/reply-to domain less than 30 days old
Callback phishing in body or attachment (untrusted sender)
Callback phishing: Social Security Administration fraud
Callback phishing via e-signature service
Callback phishing via extensionless rfc822 attachment
Callback phishing via Google Group abuse
Callback phishing via Intuit service abuse
Callback phishing via Zoho service abuse
Cloud storage impersonation with credential theft indicators