Hardbacon infrastructure abuse
Headers: Fake in-reply-to with wildcard sender and missing thread context
Headers: Invalid recipient domain with mismatched reply-to from new sender
Headers: Self-sender using Microsoft CompAuth bypass with credential theft content
Headers: System account impersonation with empty sender address
Honorific greeting BEC attempt with sender and reply-to mismatch
HR impersonation via e-sign agreement comment
HTML smuggling containing recipient email address
Impersonation: Chrome Web Store policy
Impersonation: Executive using numbered local part
Impersonation: Fake Gmail attachment
Impersonation: Human Resources with link or attachment and engaging language
Impersonation: Internal corporate services
Impersonation: Legal firm with copyright infringement notice
Impersonation: Recipient organization in sender display name with credential theft image
Impersonation: Salesforce fake campaign failure notification
Impersonation: SharePoint reply header anomaly
Impersonation: Social Security Administration (SSA)
Impersonation: Suspected supplier impersonation with suspicious content
Impersonation using recipient domain (untrusted sender)
Inbound message from popular service via newly observed distribution list
Invoicera infrastructure abuse
Job scam (unsolicited sender)
Job scam with specific salary pattern
Link: Abused Adobe Express
Link abuse: Self-service creation platform link with suspicious recipient behavior
Link: Adobe share from unsolicited sender
Link: Adobe share with suspicious indicators
Link: Apple App Store malicious ad manager themed apps from free email provider
Link: Apple TestFlight from suspicious sender
Link: Cloud service with credential theft language
Link: Cryptocurrency fraud with suspicious links
Link: Direct download of executable file
Link: Direct link to riddle.com hosted showcase
Link: Direct link to Zoom Docs from non-Zoom sender
Link: Direct MSI download from low reputation domain
Link: Executable file download with suspicious message content
Link: Figma design deck with credential theft language
Link: File sharing impersonation with suspicious language and sending patterns
Link: Free file hosting with undisclosed recipients
Link: Google Calendar invite linking to an open redirect from an untrusted freemail sender
Link: Google Drawings link from new sender
Link: Google Forms link with credential theft language
Link: Google Translate (unsolicited)
Link: Hotel booking spoofed display URL
Link: Invoice or receipt from freemail sender with customer service number
Link: Jensi file preview link from unsolicited sender
Link: Job recruitment lure from unsolicited sender with suspicious hosting
Link: Microsoft impersonation using hosted png with suspicious link