Generate a list of key indicators to help users identify potential phishing attempts in emails or messages.
Task: List common indicators of a phishing email or message. Context: Focus on elements a typical user can easily spot. Output Format: Provide a bulleted list of at least 5 indicators.
Generate a list of prevalent initial access methods and attack vectors used by cybercriminals.
Generate a list of common red flags and indicators found in phishing emails to help users recognize and report them.
Helps users recognize various types of email scams beyond traditional phishing, like BEC or invoice fraud.