Adobe branded PDF file linking to a password-protected file from untrusted sender
Advance Fee Fraud (AFF) from freemail provider or suspicious TLD
Attachment: Compensation review lure with QR code
Attachment: Credit card application with WhatsApp contact
Attachment: EML with link to credential phishing page
Attachment: Encrypted PDF with credential theft body
Attachment: Fake attachment image lure
Attachment: Fake scan-to-email
Attachment: Fake secure message and suspicious indicators
Attachment: Fake Slack installer
Attachment: Fake Zoom installer
Attachment: Fictitious invoice using LinkedIn's address
Attachment: HTML smuggling - QR Code with suspicious links
Attachment: Legal themed message or PDF with suspicious indicators
Attachment: Microsoft impersonation via PDF with link and suspicious language
Attachment: Office file contains OLE relationship to credential phishing page
Attachment: PDF file with low reputation link to ZIP file (unsolicited)
Attachment: PDF with credential theft language and link to a free subdomain (unsolicited)
Attachment: PDF with Microsoft Purview message impersonation
Attachment: PDF with suspicious language and redirect to suspicious file type
Attachment: QR code link with base64-encoded recipient address
Attachment: QR code with credential phishing indicators
Attachment: RFC822 containing suspicious file sharing language with links from untrusted sender
Attachment: RFP/RFQ impersonating government entities
Attachment: USDA bid invitation impersonation
BEC: Employee impersonation with subject manipulation
BEC/Fraud: Generic scam attempt to undisclosed recipients
BEC/Fraud: Job scam fake thread or plaintext pivot to freemail
BEC/Fraud: Student loan callback phishing
BEC with unusual reply-to or return-path mismatch
Brand impersonation: Amazon Web Services (AWS)
Brand impersonation: Amazon with suspicious attachment
Brand impersonation: Aramco
Brand impersonation: Binance
Brand impersonation: Booking.com
Brand impersonation: Chase bank with credential phishing indicators
Brand Impersonation: Disney
Brand impersonation: DocuSign branded attachment lure with no DocuSign links
Brand impersonation: DocuSign PDF attachment with suspicious link
Brand impersonation: Exodus
Brand impersonation: GitHub with callback scam indicators
Brand impersonation: Interac
Brand impersonation: Internal Revenue Service
Brand impersonation: LastPass
Brand impersonation: Mailchimp
Brand impersonation: McAfee
Brand impersonation: MetaMask
Brand impersonation: Microsoft logo or suspicious language with open redirect
Brand impersonation: Microsoft Planner with suspicious link
Brand impersonation: Microsoft quarantine release notification in image attachment