Common Phishing Examples
Click on the suspicious elements in the emails below to see why they are red flags.
Advanced Tailored Phishing
See how attackers use public information to craft highly convincing emails. Click the highlighted parts to see how the email was tailored to the victim.