Attachment: Calendar invite with suspicious link leading to an open redirect
Attachment: EML file with IPFS links
Attachment: EML with link to credential phishing page
Attachment: HTML smuggling Microsoft sign in
Attachment: HTML smuggling with raw array buffer
Attachment: PDF bid/proposal lure with credential theft indicators
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
Attachment: PDF with multistage landing - ClickUp abuse
Brand impersonation: Coinbase with suspicious links
Brand impersonation: Fake Fax
ClickFunnels link infrastructure abuse
Credential phishing: Engaging language with IPFS link
Credential phishing: Onedrive impersonation
Deceptive Dropbox mention
Free subdomain link with credential theft indicators
Free subdomain link with login or captcha (untrusted sender)
Invoicera infrastructure abuse
Link: Abused Adobe Express
Link: Blogspot hosting explicit romance content
Link: Breely link masquerading as PDF
Link: Commonly Abused Web Service redirecting to ZIP file
Link: Credential phishing via WordPress
Link: Cryptocurrency fraud with suspicious links
Link: File sharing impersonation with suspicious language and sending patterns
Link: Financial account issue with suspicious indicators
Link: Free file hosting with undisclosed recipients
Link: Free subdomain host with undisclosed recipients
Link: Jensi file preview link from unsolicited sender
Link: Multistage landing - Abused Docusign
Link: Multistage landing - ClickUp abuse
Link: Tycoon2FA phishing kit (non-exhaustive)
Link: Webflow link from unsolicited sender
Link: WordPress login page with Blogspot Binance scam
Low reputation link to auto-downloaded HTML file with smuggling indicators
Message traversed multiple onmicrosoft.com tenants
Self-sent fake PDF attachment with misleading link
Service abuse: Google application integration redirecting to suspicious hosts
Service abuse: Google Firebase sender address with suspicious content
Service abuse: Google OAuth with suspicious redirect destination
Shopify infrastructure abuse
Spam: Link to blob.core.windows.net from new domain (<30d)
Spoofable internal domain with suspicious signals
Vendor compromise: GovDelivery message with suspicious link
Zoom Events newsletter abuse