Open redirect: giving.lluh.org
Open Redirect: Google domain with /url path and suspicious indicators
Open redirect: marketing.edinburghairport.com
Open redirect: people.anuneo.com
Open redirect: Shibboleth SSO Logout Return Parameter
Open redirect: slubnaglowie.pl
Open redirect: typedrawers.com
Open redirect: weblinkconnect.com
Open redirect: Xfinity CMP Redirection to Google AMP
Outlook hyperlink bypass: left-to-right mark (LRM) in base HTML tag
PhaaS: Impact Solutions (Impact Vector Suite)
Potential prompt injection attack in body HTML
QR code to auto-download of a suspicious file type (unsolicited)
Reconnaissance: Empty message from uncommon sender
Reconnaissance: Empty subject with mismatched reply-to from new sender
Request for Quote or Purchase (RFQ|RFP) with HTML smuggling attachment
Request for Quote or Purchase (RFQ|RFP) with suspicious sender or recipient pattern
Salesforce infrastructure abuse
Self-sender with copy/paste instructions and suspicious domains (French/Français)
Self-sent fake PDF attachment with misleading link
Sender: IP address in local part
Sendgrid onmicrosoft.com domain phishing
Service abuse: Adobe Creative Cloud share from an unsolicited sender address
Service abuse: AppSheet infrastructure with suspicious indicators
Service Abuse: Box file sharing with credential phishing intent
Service abuse: Cisco secure email service with financial request
Service abuse: DocSend share from an unsolicited reply-to address
Service abuse: DocSend share from newly registered domain
Service abuse: DocuSign notification with suspicious sender or document name
Service abuse: DocuSign share from an unsolicited reply-to address
Service abuse: Domains By Proxy sender
Service abuse: Dropbox share from an unsolicited reply-to address
Service abuse: Dropbox share from new domain
Service abuse: Dropbox share with suspicious sender or document name
Service Abuse: ExactTarget with suspicious sender indicators
Service abuse: FlipHTML5 with attachment deception and credential theft language
Service abuse: Free provider with SendGrid routing
Service Abuse: GoDaddy infrastructure
Service abuse: Google application integration redirecting to suspicious hosts
Service abuse: Google OAuth with suspicious redirect destination
Service abuse: HelloSign from an unsolicited sender address
Service Abuse: HelloSign share with suspicious sender or document name
Service abuse: HungerRush domain with SendGrid tracking targeting ProtonMail
Service abuse: Meetup.com redirect with brand impersonation
Service abuse: Mimecast URL with excessive path length
Service abuse: Monday.com infrastructure with phishing intent