Link: Direct link to Zoom Docs from non-Zoom sender
Link: Direct POWR.io Form Builder with suspicious patterns
Link: Display text matches subject line
Link: Executable file download with suspicious message content
Link: Figma design deck with credential theft language
Link: File sharing impersonation with suspicious language and sending patterns
Link: File sharing pretext with suspicious body and link
Link: Financial account issue with suspicious indicators
Link: Google Calendar invite linking to an open redirect from an untrusted freemail sender
Link: Google Drawings link from new sender
Link: Google Forms link with credential theft language
Link: Hotel booking spoofed display URL
Link: HR impersonation with suspicious domain indicators and credential theft
Link: /index.php enclosed in three asterisks
Link: Intuit link abuse with file share context
Link: Invoice or receipt from freemail sender with customer service number
Link: Job recruitment lure from unsolicited sender with suspicious hosting
Link: Mamba 2FA phishing kit
Link: Microsoft device code authentication with suspicious indicators
Link: Microsoft impersonation using hosted png with suspicious link
Link: Microsoft protected message with matching sender and recipient addresses
Link: Multistage landing - Abused Adobe Acrobat hosted PDF
Link: Multistage Landing - Abused Buildin.ai
Link: Multistage landing - FreshDesk knowledge base abuse
Link: Multistage landing - JotForm abuse
Link: Multistage landing - Ludus presentation
Link: Multistage landing - Microsoft Forms abuse
Link: Multistage landing - Published Google Doc
Link: Multistage landing - Scribd document
Link: Multistage landing - Trello board abuse
Link: MyActiveCampaign Link Abuse
Link: .onion From Unsolicited Sender
Link: PDF and financial display text to free file host
Link: PDF filename impersonation with credential theft language
Link: Personalized URL with recipient address on commonly abused web service
Link: Personal SharePoint with invalid recipients and credential theft language
Link: QR code with phishing disposition in img or pdf
Link: QR Code with suspicious language (untrusted sender)
Link: QuickBooks image lure with suspicious link
Link: Recipient email address in 'eta' parameter
Link: RFI document reference pattern in display text
Link: Romance/Sexual Language With Suspicious Link
Link: ScreenConnect installer with suspicious relay domain
Link: Scribd fullscreen link from suspicious sender
Link: Self-sender with sender org in subject and credential theft indicator
Link: Self-sent message with quarterly document review request
Link: SharePoint filename matches org name
Link: Shortened URL with fragment matching subject
Link: Single character path with credential theft body and self sender behavior or invalid recipient
Link: Squarespace infrastructure abuse