Service abuse: Google OAuth with suspicious redirect destination
Service abuse: Meetup.com redirect with brand impersonation
Service abuse: Mimecast URL with excessive path length
Service abuse: Monday.com infrastructure with phishing intent
Service abuse: Nylas tracking subdomain with suspicious content
Service abuse: SendGrid-formatted link with actor-controlled fragment
Service abuse: Substack credential theft with confusable characters and branded button redirects
Service abuse: Vimeo with external plain-text links in message
Service abuse: Wix redirect through bulk mailer domains
Sharepoint file share with suspicious recipients pattern
Sharepoint link likely unrelated to sender
Shopify infrastructure abuse
Spam: Commonly observed formatting of unauthorized free giveaways
Spam: Fake dating profile notification
Spam: Firebase password reset from suspicious sender
Spam/fraud: Predatory journal/research paper request
Spam: Link to blob.core.windows.net from new domain (<30d)
Spam: New job cold outreach from unsolicited sender
Spam: New link domain (<=10d) and emojis
Spam: Single recipient duplicated in cc
Spam: Unsolicited WordPress account creation or password reset request
Spam: URL shortener with short body content and emojis
Suspicious attachment with unscannable Cloudflare link
Suspicious Links to Cloudflare R2 and Edge Services
Suspicious link to Looker Studio (lookerstudio.google.com) from a new and unsolicited sender
Suspicious message with unscannable Cloudflare link
Suspicious message with unscannable Vercel link
Suspicious newly registered reply-to domain with engaging financial or urgent language
Suspicious Office 365 app authorization (OAuth) link
Suspicious recipient pattern and language with low reputation link to login
Suspicious recipients pattern with NLU credential theft indicators
Suspicious recipients pattern with no Compauth pass and suspicious content
Suspicious SharePoint file sharing
Tax Form: W-8BEN solicitation
Truth Social infrastructure abuse via link redirect
Twitter infrastructure abuse via link shortener
URLhaus: Malicious domain in message body or pdf attachment (trusted reporters)
URL with Unicode U+2044 (⁄) or U+2215 (∕) characters
Vendor compromise: GovDelivery message with suspicious link
Xero infrastructure abuse
Zoom Events newsletter abuse