Attachment: Calendar invite with suspicious link leading to an open redirect
Attachment: EML file with IPFS links
Attachment: EML with link to credential phishing page
Attachment: Fake scan-to-email
Attachment: PDF with multistage landing - ClickUp abuse
Brand impersonation: Fake Fax
Brand impersonation: Microsoft quarantine release notification in image attachment
Brand impersonation: Microsoft with low reputation links
Canva design with suspicious embedded link
Catbox.moe link from untrusted source
Cloud storage impersonation with credential theft indicators
Credential phishing: Engaging language with IPFS link
Credential phishing: Hyper-linked image leading to free file host
Deceptive Dropbox mention
DocuSign impersonation via CloudHQ links
Fake scan-to-email message
Fake shipping notification with link to free file hosting
File sharing link from suspicious sender domain
File sharing link with a suspicious subject
Google Drive abuse: Credential phishing link
Google Drive direct download link from unsolicited sender
Google share notification with suspicious comments
Invoicera infrastructure abuse
Issuu document with suspicious embedded link
Link: Abused Adobe Express
Link: Adobe share from unsolicited sender
Link: Adobe share with suspicious indicators
Link: Commonly Abused Web Service redirecting to ZIP file
Link: Direct link to gamma.app document with mode parameter
Link: Direct link to keap.app contact-us page
Link: Direct link to limewire hosted file
Link: Direct link to riddle.com hosted showcase
Link: Figma design deck with credential theft language
Link: Free file hosting with undisclosed recipients
Link: Google Calendar invite linking to an open redirect from an untrusted freemail sender
Link: Jensi file preview link from unsolicited sender
Link: Multistage landing - Abused Adobe frame.io
Link: Multistage Landing - Abused Buildin.ai
Link: Multistage landing - Abused Docusign
Link: Multistage landing - Abused Google Drive
Link: Multistage landing - ClickUp abuse
Link: Multistage landing - Published Google Doc
Link: Multistage landing - Scribd document
Link: Multistage landing - Trello board abuse
Link: PDF and financial display text to free file host
Link: Scribd fullscreen link from suspicious sender
Link: Secure SharePoint file share from new or unusual sender
Link: SharePoint OneNote or PDF link with self sender behavior
Link: Suspicious SharePoint document name