Brand Impersonation: ShareFile
Brand impersonation: SharePoint PDF attachment with credential theft language
Brand impersonation: Stripe notification
Brand impersonation: Zoom
Business Email Compromise (BEC) attempt with masked recipients and reply-to mismatch (unsolicited)
Callback phishing: Social Security Administration fraud
Callback phishing: SumUp infrastructure abuse
Callback phishing via Adobe Sign comment
Callback phishing via calendar invite
Callback phishing via DocuSign comment
Callback phishing via Intuit service abuse
Callback phishing via Zelle Service Abuse
Callback phishing via Zoho service abuse
Canva design with suspicious embedded link
Credential phishing: Generic document share template
Credential phishing: Generic document sharing
Credential phishing: Hyper-linked image leading to free file host
Credential phishing: Image as content, short or no body contents
Credential Phishing: Suspicious language, link, recipients and other indicators
Credential Phishing via Dropbox comment abuse
Credential Phishing: W-2 lure with inline SVG Windows logo
Credential theft: Gophish abuse with hidden tracking image
Credential theft with 'safe content' deception and social engineering topics
CVE-2023-5631 - Roundcube Webmail XSS via crafted SVG
Cyrillic vowel substitution in subject or display name from unknown sender
Cyrillic vowel substitutions with suspicious subject from unknown sender
Display Name Emoji with Financial Symbols
EML attachment with credential theft language (unknown sender)
Encrypted Microsoft Office files from untrusted sender
Fake shipping notification with suspicious language
Fake thread with suspicious indicators
Fake warning banner using confusable characters
Fake Zoho Sign template abuse
Fake Zoom meeting invite with suspicious link
Generic service abuse from newly registered domain
Google Drive direct download link from unsolicited sender
Google presentation open redirect phishing
Google services using g.co shortlinks
Hardbacon infrastructure abuse
Headers: Fake in-reply-to with wildcard sender and missing thread context
Headers: Invalid recipient domain with mismatched reply-to from new sender
Headers: iOS/iPadOS mailer with invalid build number
Headers: Outlook Express mailer
Headers: risky-recover-production message ID
Headers: Self-sender using Microsoft CompAuth bypass with credential theft content
HR impersonation via e-sign agreement comment
HTML: Bidirectional (BIDI) HTML override with right to left obfuscation
HTML smuggling containing recipient email address
Image as content with a link to an open redirect (unsolicited)
Impersonation: SharePoint reply header anomaly