• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • NoSpamProxy 25Reports
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • 32Guards Sandbox
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
ZIP-Bomben: erst klein, dann gemein 1200x627

ZIP bombs: big trouble in a small package

25Reports, 32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Protection

Imagine this: You receive an email with a seemingly harmless ZIP file attached, just a few kilobytes in size. Your system begins to unzip the file, and crashes. What follows is a system failure, wasted storage space, or, in the worst case, a gateway for further malicious code. The cause is a ZIP bomb, detonating within your IT infrastructure. In this blog post, we explain what ZIP bombs are, how they overload systems through extreme data compression and serve as a distraction for attacks, what variants exist, and how to effectively protect against them using multi-layered security mechanisms like NoSpamProxy.

Read more
13.04.2026/by Stefan Sturm

NoSpamProxy: The Right Choice for Enterprise Environments

25Reports, 32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Disclaimer, NoSpamProxy Encryption, NospamProxy Large Files, NoSpamProxy Protection, Product

CEO fraud, phishing, ransomware via infected attachments: Email remains the preferred entry point for attackers. In enterprise environments, the risk is magnified: more mailboxes, more locations, more entry points. And the attacks are becoming more sophisticated. AI-generated text, spoofed sender domains, context-specific attempts at deception – what used to be recognizable by poor spelling is now almost indistinguishable from a genuine sender. Enterprise organizations with hundreds or thousands of mailboxes, complex IT landscapes, and strict compliance requirements have unique needs. This is where NoSpamProxy comes in.

Read more
31.03.2026/by Stefan Sturm
Wie Cloaking Phishing-Angriffe tarnt 800x800

How cloaking disguises phishing attacks

32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Protection, Product

Traditional email security solutions check URLs when a message is received. If the linked page appears normal, the email is allowed to reach the inbox. But what if security systems see something different than the users who later click on the link? Cloaking techniques make this possible—and thus call into question a fundamental principle of URL filtering.

Read more
23.01.2026/by Stefan Sturm
Gelöschter SPF-Eintrag: Warum DNS-Alarmierung unverzichtbar ist 800x800

When the service provider deletes the SPF record: Why DNS alerts are essential

32Guards, NoSpamProxy Cloud, NoSpamProxy Protection, Product

An accidentally deleted SPF entry, an unsuspecting email administrator, and weeks of undetected delivery problems—what sounds like a worst-case scenario actually happened. The case shows how 25Reports not only makes problems visible, but also enables them to be quickly resolved.

Read more
16.01.2026/by Stefan Sturm
Link Wrapping als Angriffsvektor 800x800

Link wrapping as an attack vector

32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Protection, Product

URL rewriting promises protection against phishing attacks by rewriting URLs in incoming emails and rechecking them every time they are clicked. Link wrapping attacks specifically exploit URL rewriting in emails. Learn how these attacks work and how you can effectively protect yourself against them.

Read more
05.01.2026/by Stefan Sturm
Fileless Malware 800x800

Fileless malware, or: The Ghost In The Machine

25Reports, 32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Protection

Imagine a burglar breaking into your house without leaving any footprints or fingerprints. That’s exactly how fileless malware operates: invisible to traditional security systems, but extremely dangerous. In our blog article, you can find out what fileless malware is and how you can defend yourself against attacks.

Read more
25.11.2025/by Stefan Sturm
Flow Guard in NoSpamProxy: Ihr Schutz gegen E-Mail-Missbrauch 800x800

Flow Guard in NoSpamProxy: Your protection against email abuse

32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Protection

Every day, companies fall victim to email abuse, and the consequences are serious: damage to reputation, blocked communication, and, last but not least, financial losses. This is exactly where Flow Guard from NoSpamProxy comes in: it acts as an automatic shield before damage can occur.

Read more
07.11.2025/by Stefan Sturm
Intelligentes Greylisting mit NoSpamProxy 800x800

Intelligent greylisting with NoSpamProxy

32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Protection

Every day, millions of unwanted emails are sent over the internet. Spam filters do their best to block these emails, but some unwanted messages still find their way into our inboxes. There is a frequently overlooked but effective protective measure against spam: greylisting. The principle behind greylisting is to save time. With greylisting, emails are initially rejected and only accepted after a second delivery attempt. In addition, greylisting separates legitimate mail servers from those that do not comply with the relevant RFCs.

In this article, you will learn how greylisting works, why it is still an integral part of modern spam protection today, and why the intelligent greylisting in NoSpamProxy is particularly effective.

Read more
30.10.2025/by Stefan Sturm
Page 1 of 10123›»

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events

NoSpamProxy Newsletter

Subscribe to Newsletter
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • ZIP-Bomben: erst klein, dann gemein 1200x627
    ZIP bombs: big trouble in a small package13.04.2026 - 10:00
  • NoSpamProxy: The Right Choice for Enterprise Environments31.03.2026 - 10:00
  • Server und Cloud Unterschiede und Wechsel Tipps 800x800
    NoSpamProxy Server and NoSpamProxy Cloud: Differences and Tips for Switching16.03.2026 - 11:00
IMPRINT • EULA • Privacy Policy • • © 2026 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Scroll to top Scroll to top Scroll to top