An accountant opens her mailbox in the morning. There is an email from her long-standing IT service provider – with an invoice for €14,800 attached. The IBAN looks strange, but a short note in the document explains: “Please note our new bank details.” She transfers the amount. Three weeks later, the real supplier sends the first reminder for the invoice – because the money was transferred to the wrong account. To an account abroad. The money is gone, irretrievably. Scenarios like this play out every day in companies around the world. This type of attack has a name: invoice fraud, a sub-form of what is known as Business Email Compromise (BEC). What is often overlooked is that there are always two victims. The recipient who transfers the money and the company whose identity was misused for the attack – and which may not even notice.
Effective immediately, public CAs (certification authorities) are no longer permitted to use the Extended Key Usages (EKU) id-kp-clientAuth and id-kp-serverAuth simultaneously in TLS certificates. Those who do not comply with this rule will no longer be included in the Chrome Root Program and will therefore no longer appear in the Trust Store. We provide information about who is affected and what you should do now.
DMARC reports are a key tool for checking whether a domain’s SPF, DKIM, and DMARC configuration is effective and whether all legitimate senders are being authenticated correctly. Deviations – especially inconsistencies or a lack of alignment between SPF and DKIM – indicate problems in the email infrastructure. A practical example shows why a detailed DMARC analysis is essential for detecting and permanently resolving such problems.
With its official market launch, 25Reports is bringing a new generation of DMARC analysis into productive use. Following a successful early access phase, which began on September 1, 2025, the new features are now available to all users.
In Germany, between 30,000 and 40,000 companies are affected by the requirements of the NIS 2 Directive. Around 80% of them are unaware of this, even though failure to comply can result in severe penalties. In this blog article, you can find out what NIS2 is, what changes the EU Commission has proposed for 2026, and how you can prepare your company for the directive.
Traditional email security solutions check URLs when a message is received. If the linked page appears normal, the email is allowed to reach the inbox. But what if security systems see something different than the users who later click on the link? Cloaking techniques make this possible—and thus call into question a fundamental principle of URL filtering.
An accidentally deleted SPF entry, an unsuspecting email administrator, and weeks of undetected delivery problems—what sounds like a worst-case scenario actually happened. The case shows how 25Reports not only makes problems visible, but also enables them to be quickly resolved.
URL rewriting promises protection against phishing attacks by rewriting URLs in incoming emails and rechecking them every time they are clicked. Link wrapping attacks specifically exploit URL rewriting in emails. Learn how these attacks work and how you can effectively protect yourself against them.
NoSpamProxy
Categories
Latest News
When invoices become a trap: Invoice fraud and what you can do about it24.02.2026 - 10:00
End of TLS Client Authentication Certificates19.02.2026 - 14:09
NoSpamProxy enables DKIM signing of automated emails – update now!13.02.2026 - 11:38







