NoSpamProxy
Categories
Latest News
ZIP bombs: big trouble in a small package13.04.2026 - 10:00
NoSpamProxy: The Right Choice for Enterprise Environments31.03.2026 - 10:00
You are currently viewing a placeholder content from Google Maps. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information
ZIP bombs: big trouble in a small package
25Reports, 32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy ProtectionImagine this: You receive an email with a seemingly harmless ZIP file attached, just a few kilobytes in size. Your system begins to unzip the file, and crashes. What follows is a system failure, wasted storage space, or, in the worst case, a gateway for further malicious code. The cause is a ZIP bomb, detonating within your IT infrastructure. In this blog post, we explain what ZIP bombs are, how they overload systems through extreme data compression and serve as a distraction for attacks, what variants exist, and how to effectively protect against them using multi-layered security mechanisms like NoSpamProxy.
NoSpamProxy: The Right Choice for Enterprise Environments
25Reports, 32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Disclaimer, NoSpamProxy Encryption, NospamProxy Large Files, NoSpamProxy Protection, ProductCEO fraud, phishing, ransomware via infected attachments: Email remains the preferred entry point for attackers. In enterprise environments, the risk is magnified: more mailboxes, more locations, more entry points. And the attacks are becoming more sophisticated. AI-generated text, spoofed sender domains, context-specific attempts at deception – what used to be recognizable by poor spelling is now almost indistinguishable from a genuine sender. Enterprise organizations with hundreds or thousands of mailboxes, complex IT landscapes, and strict compliance requirements have unique needs. This is where NoSpamProxy comes in.
NoSpamProxy Server and NoSpamProxy Cloud: Differences and Tips for Switching
All Topics, NoSpamProxy Cloud, NoSpamProxy Disclaimer, NoSpamProxy Encryption, NospamProxy Large Files, ProductNoSpamProxy Server has proven itself over the years as a reliable on-premises solution for email security. Many companies have been using the solution for a long time—and for good reason: control over their own infrastructure, the ability to customize configurations, and independence from external services are compelling arguments for on-premises operation. But the IT landscape is changing—and cloud solutions are increasingly coming to the forefront. NoSpamProxy Cloud offers a compelling alternative to on-premises operation with NoSpamProxy Server. Both versions are developed on a shared codebase. Those who switch will find a familiar environment on the other side. In this article, we highlight the key differences between NoSpamProxy Server and NoSpamProxy Cloud—and explain how to successfully transition to the cloud step by step.
When invoices become a trap: Invoice fraud and what you can do about it
25Reports, All Topics, NoSpamProxy Cloud, NoSpamProxy ProtectionAn accountant opens her mailbox in the morning. There is an email from her long-standing IT service provider – with an invoice for €14,800 attached. The IBAN looks strange, but a short note in the document explains: “Please note our new bank details.” She transfers the amount. Three weeks later, the real supplier sends the first reminder for the invoice – because the money was transferred to the wrong account. To an account abroad. The money is gone, irretrievably. Scenarios like this play out every day in companies around the world. This type of attack has a name: invoice fraud, a sub-form of what is known as Business Email Compromise (BEC). What is often overlooked is that there are always two victims. The recipient who transfers the money and the company whose identity was misused for the attack – and which may not even notice.
End of TLS Client Authentication Certificates
All Topics, News, NoSpamProxy Cloud, NoSpamProxy Encryption, Tech & SupportEffective immediately, public CAs (certification authorities) are no longer permitted to use the Extended Key Usages (EKU) id-kp-clientAuth and id-kp-serverAuth simultaneously in TLS certificates. Those who do not comply with this rule will no longer be included in the Chrome Root Program and will therefore no longer appear in the Trust Store. We provide information about who is affected and what you should do now.
NoSpamProxy enables DKIM signing of automated emails – update now!
25Reports, All Topics, News, NoSpamProxy Cloud, Product, Tech & Support, UpdatesDMARC reports are a key tool for checking whether a domain’s SPF, DKIM, and DMARC configuration is effective and whether all legitimate senders are being authenticated correctly. Deviations – especially inconsistencies or a lack of alignment between SPF and DKIM – indicate problems in the email infrastructure. A practical example shows why a detailed DMARC analysis is essential for detecting and permanently resolving such problems.
secIT 2026 – Secure your free tickets now!
All TopicssecIT by heise medien is THE congress trade fair for security professionals – and we will be there! From March 18 to 19, 2026, over 100 companies will present their tools, services, and expertise at the Hannover Congress Centrum (HCC). You can look forward to an extensive program of presentations on four stages with over 50 exciting sessions, as well as workshops and deep dive sessions that will give you practical insights into the latest IT security solutions. You will find us in the Eilenriedehalle, booth number E38.
25Reports launches: A new standard for DMARC analysis
All TopicsWith its official market launch, 25Reports is bringing a new generation of DMARC analysis into productive use. Following a successful early access phase, which began on September 1, 2025, the new features are now available to all users.