Deceptive Dropbox mention
DocuSign impersonation via CloudHQ links
Fake message thread with a suspicious link and engaging language from an unknown sender
Fake scan-to-email message
Fake voicemail notification (untrusted sender)
Fake Zoho Sign template abuse
Fake Zoom meeting invite with suspicious link
File sharing link from suspicious sender domain
File sharing link with a suspicious subject
Free subdomain link with credential theft indicators
Google Accelerated Mobile Pages (AMP) abuse
Google Drive abuse: Credential phishing link
Google Drive direct download link from unsolicited sender
Google Notification alert link from non-Google sender
Google presentation open redirect phishing
Google services using g.co shortlinks
Image as content with a link to an open redirect (unsolicited)
Impersonation: Chrome Web Store policy
Impersonation: Salesforce fake campaign failure notification
Impersonation: Social Security Administration (SSA)
Impersonation: Suspected supplier impersonation with suspicious content
Inline image as message with attachment or link
Issuu document with suspicious embedded link
Link: 9WOLF phishkit initial landing URI
Link: Abused Adobe Express
Link abuse: Self-service creation platform link with suspicious recipient behavior
Link: Adobe share with suspicious indicators
Link: Apple App Store link to apps impersonating AI adveristing
Link: Apple App Store malicious ad manager themed apps from free email provider
Link: Apple TestFlight from suspicious sender
Link: Base64 encoded recipient address in URL fragment with hex subdomain
Link: Base64 encoded recipient address in URL fragment with subject hash
Link: Blogspot hosting explicit romance content
Link: Breely link masquerading as PDF
Link: chatbot.page platform abuse
Link: Cloud service with credential theft language
Link: Common hidden directory observed
Link: Commonly Abused Web Service redirecting to ZIP file
Link: Credential phishing traversing Russian infrastructure
Link: Credential phishing via WordPress
Link: Credential theft with invisible Unicode character in page title from unsolicited sender
Link: Cryptocurrency fraud with suspicious links
Link: CVE-2024-21413 Microsoft Outlook Remote Code Execution Vulnerability
Link: Direct download of executable file
Link: Direct link to gamma.app document with mode parameter
Link: Direct link to keap.app contact-us page
Link: Direct link to limewire hosted file
Link: Direct link to riddle.com hosted showcase
Link: Direct link to Zoom Docs from non-Zoom sender
Link: Direct MSI download from low reputation domain