Imagine this: You receive an email with a seemingly harmless ZIP file attached, just a few kilobytes in size. Your system begins to unzip the file, and crashes. What follows is a system failure, wasted storage space, or, in the worst case, a gateway for further malicious code. The cause is a ZIP bomb, detonating within your IT infrastructure. In this blog post, we explain what ZIP bombs are, how they overload systems through extreme data compression and serve as a distraction for attacks, what variants exist, and how to effectively protect against them using multi-layered security mechanisms like NoSpamProxy.
CEO fraud, phishing, ransomware via infected attachments: Email remains the preferred entry point for attackers. In enterprise environments, the risk is magnified: more mailboxes, more locations, more entry points. And the attacks are becoming more sophisticated. AI-generated text, spoofed sender domains, context-specific attempts at deception – what used to be recognizable by poor spelling is now almost indistinguishable from a genuine sender. Enterprise organizations with hundreds or thousands of mailboxes, complex IT landscapes, and strict compliance requirements have unique needs. This is where NoSpamProxy comes in.
Traditional email security solutions check URLs when a message is received. If the linked page appears normal, the email is allowed to reach the inbox. But what if security systems see something different than the users who later click on the link? Cloaking techniques make this possible—and thus call into question a fundamental principle of URL filtering.
An accidentally deleted SPF entry, an unsuspecting email administrator, and weeks of undetected delivery problems—what sounds like a worst-case scenario actually happened. The case shows how 25Reports not only makes problems visible, but also enables them to be quickly resolved.
URL rewriting promises protection against phishing attacks by rewriting URLs in incoming emails and rechecking them every time they are clicked. Link wrapping attacks specifically exploit URL rewriting in emails. Learn how these attacks work and how you can effectively protect yourself against them.
Imagine a burglar breaking into your house without leaving any footprints or fingerprints. That’s exactly how fileless malware operates: invisible to traditional security systems, but extremely dangerous. In our blog article, you can find out what fileless malware is and how you can defend yourself against attacks.
Every day, companies fall victim to email abuse, and the consequences are serious: damage to reputation, blocked communication, and, last but not least, financial losses. This is exactly where Flow Guard from NoSpamProxy comes in: it acts as an automatic shield before damage can occur.
Every day, millions of unwanted emails are sent over the internet. Spam filters do their best to block these emails, but some unwanted messages still find their way into our inboxes. There is a frequently overlooked but effective protective measure against spam: greylisting. The principle behind greylisting is to save time. With greylisting, emails are initially rejected and only accepted after a second delivery attempt. In addition, greylisting separates legitimate mail servers from those that do not comply with the relevant RFCs.
In this article, you will learn how greylisting works, why it is still an integral part of modern spam protection today, and why the intelligent greylisting in NoSpamProxy is particularly effective.
NoSpamProxy
Categories
Latest News
ZIP bombs: big trouble in a small package13.04.2026 - 10:00
NoSpamProxy: The Right Choice for Enterprise Environments31.03.2026 - 10:00








