Phishing: Fraudulent emails that appear to come from reputable sources to steal sensitive information. Spoofing: Altering the sender's address to make the email appear as if it is coming from a trusted source. Content Modification: Changing the content of the email, including text, images, and links. Tracking Link Manipulation: Altering tracking links to mislead the email sender about engagement metrics.