Trust model
Verify before action
This page is intentionally staged. Choose a threat, then move through Observe, Verify, Contain, and Report in order.
Trust model
Verify before action
Evidence rule
Capture first, clean up second
Escalation rule
Official channel only
Threat actors are embedding QR codes in phishing emails to bypass link filters and push users into credential-harvesting pages.
Latest advisory
FBI Cyber Alert published January 8, 2026
Impact
Credential theft and mailbox/account takeover
Action window
Before scan
Guided response stages
Pause and inspect before interacting with the message.
Guided journey
Step 2 of 9: Threats