Email security requirements are increasing and becoming increasingly complex. Companies not only have to implement DMARC, but also ensure that their configuration is correct and secure at all times. This is exactly where 25Reports comes in, and with the latest update, the platform is now even more powerful: alerts, access management, and reseller settings bring significant improvements for IT teams and resellers.
Every day, companies fall victim to email abuse, and the consequences are serious: damage to reputation, blocked communication, and, last but not least, financial losses. This is exactly where Flow Guard from NoSpamProxy comes in: it acts as an automatic shield before damage can occur.
Every day, millions of unwanted emails are sent over the internet. Spam filters do their best to block these emails, but some unwanted messages still find their way into our inboxes. There is a frequently overlooked but effective protective measure against spam: greylisting. The principle behind greylisting is to save time. With greylisting, emails are initially rejected and only accepted after a second delivery attempt. In addition, greylisting separates legitimate mail servers from those that do not comply with the relevant RFCs.
In this article, you will learn how greylisting works, why it is still an integral part of modern spam protection today, and why the intelligent greylisting in NoSpamProxy is particularly effective.
Effective immediately, public CAs (certification authorities) are no longer permitted to use the Extended Key Usages (EKU) id-kp-clientAuth and id-kp-serverAuth simultaneously in TLS certificates. Those who do not comply with this rule will no longer be included in the Chrome Root Program and will therefore no longer appear in the Trust Store. We provide information about who is affected and what you should do now.
Whaling is a form of phishing that targets the “big fish” in a company, i.e., CEOs and other executives who have power, money, information, and influence. In our blog article, you can find out what whaling is, how it works, and how you can protect yourself and your company from whaling.
The new integration significantly reduces the administrative effort required for email encryption and offers seamless integration of HARICA certificates into the existing infrastructure of universities and research institutions.
Digitization has also led to fundamental changes in the legal and administrative sectors. One of the most important developments was the introduction of the Electronic Court and Administration Mailbox (EGVP), which enabled the secure exchange of documents between citizens, companies, lawyers, authorities, and courts. The EGVP has since been replaced by specialized electronic mailboxes such as beA, beN, beBPo, beSt, and eBO—each with a clearly defined scope of application. The following overview shows the development from the original EGVP to today’s solutions and explains how they work in practice.
The used car trade is booming like never before—especially online. The multitude of platforms and digital marketplaces makes business easier, but also attracts criminals. Prospective buyers are always potential targets for fraudsters who use increasingly sophisticated scams to try to obtain money or sensitive data. One particularly dangerous scam is phishing with fake car catalogs. Victims receive seemingly professional offers in the mail, but these are actually the work of organized cybercriminals.
NoSpamProxy
Categories
Latest News
Flow Guard in NoSpamProxy: Your protection against email abuse07.11.2025 - 14:07
Intelligent greylisting with NoSpamProxy30.10.2025 - 13:35







