Scammers are exploiting Spotify’s playlist and podcast features to spread malware and phishing schemes, often attracting users via popular search terms. Using artificial voices and directing users to risky sites, these scams exploit Spotify’s reputation to rank highly on search engines. Users are advised to avoid suspicious links, verify creators and use official download sources.

Scammers Exploit Disposable VoIP Numbers to Bypass Reputation Blocking
New tactics used by threat actors who embed phone numbers in scam emails as a key indicator of compromise (IOC), revealing how attackers exploit VoIP


.webp?w=0&resize=0,0&ssl=1)