Spam: Sendersrv.com with financial communications and unsubscribe language
Spam: Sexually explicit content with emoji in subject from freemail provider
Spam: Sexually explicit Google Drive share
Spam: Sexually explicit Google group invitation
Spam: Sexually explicit Looker Studio report
Spam: Single recipient duplicated in cc
Spam: Unsolicited malformed PDF
Spam: Unsolicited WordPress account creation or password reset request
Spam: URL shortener with short body content and emojis
Spam: Website errors solicitation
Spoofable internal domain with suspicious signals
Subject and sender display name contains matching long alphanumeric string
Suspected cross-site scripting (XSS) found in subject
Suspected lookalike domain with suspicious language
Suspected WordPress abuse with cross-site scripting (XSS) indicators
Suspicious attachment with unscannable Cloudflare link
Suspicious display name: Gmail sender with engaging language
Suspicious DocuSign share from new domain
Suspicious invoice reference with missing or image-only attachments
Suspicious Links to Cloudflare R2 and Edge Services
Suspicious link to Looker Studio (lookerstudio.google.com) from a new and unsolicited sender
Suspicious message with unscannable Cloudflare link
Suspicious message with unscannable Vercel link
Suspicious newly registered reply-to domain with engaging financial or urgent language
Suspicious recipient pattern and language with low reputation link to login
Suspicious request for financial information
Suspicious sender display name with long procedurally generated text blob
Suspicious SharePoint file sharing
Suspicious subject with long procedurally generated text blob
Suspicious VBA macros from untrusted sender
Truth Social infrastructure abuse via link redirect
Twitter infrastructure abuse via link shortener
Unusually long local part from untrusted sender address
Vendor impersonation: Thread hijacking with typosquat domain
Venmo payment request abuse
VIP / Executive impersonation in subject (untrusted)
VIP / Executive impersonation (strict match, untrusted)
VIP impersonation: Fake thread with display name match, email mismatch
VIP Impersonation via Google Group relay with suspicious indicators
VIP impersonation with BEC language (near match, untrusted sender)
VIP impersonation with charitable donation fraud
VIP impersonation with urgent request (strict match, untrusted sender)
VIP local_part impersonation from unsolicited sender
X (Twitter) impersonation with credential phishing motives