Email is and remains the most popular gateway for cyber attacks. Traditional spam filters are no longer sufficient. Modern threats such as targeted phishing, CEO fraud or ransomware are so sophisticated that they can bypass conventional protection mechanisms. This is exactly where Advanced Threat Protection (ATP) comes in: as an intelligent, multi-layered defense mechanism against current attack scenarios. NoSpamProxy includes a wide range of ATP functions as standard, which do not require additional licensing. Read our blog article to find out why ATP is so important and why NoSpamProxy effectively protects you and your company against threats.
A company’s success is also based on a strong focus on customer satisfaction and sustainable support. Customer Success Management (CSM), which accompanies and supports customers from day one, plays a key role in this. Today we talk to Tim Kaleja, Competence Lead Customer Success at NoSpamProxy, about the opportunities and challenges in customer dialog and what makes Customer Success Management at NoSpamProxy so special.
Zero-day exploits are among the most dangerous threats in IT security. They exploit previously unknown vulnerabilities in software for which no protective measures yet exist, which makes them particularly insidious. This type of attack is often used by hackers, but also by secret services, to compromise systems undetected. In this article, you will learn how zero-day exploits work, what forms they can take and how you can best protect yourself against them.
Email spoofing is a particularly insidious form of cyberattack: the sender of an email is falsified in order to gain trust and deceive recipients. The consequences range from data theft and malware to financial damage. In this article, you will learn how spoofing works, why it is so dangerous – and how you can effectively protect yourself against it.
Scamming is no longer a fringe phenomenon. Behind the innocent-sounding term lies a multitude of sophisticated scams that are used on a massive scale, particularly via email. Whether phishing, CxO fraud or romance scams, in this article you will learn how modern scams work, how to recognise them and what measures you can take to effectively protect yourself and your company.
On March 15, 2025, the licence for the Core Antispam Engine expired for some customers. In some cases, this resulted in temporary rejections of emails.
E-invoicing will be mandatory from January 1, 2025 and many companies already use a dedicated email address to receive e-invoices. Find out why this makes sense and how NoSpamProxy optimally protects your mailbox in this blog article.
Cyber criminals are currently using phishing to spread a malware called Strela Stealer via German-language emails. Strela Stealer harvests login data from Outlook and Thunderbird accounts. The criminals then use originally legitimate emails containing invoices, which they forward and send to their victims. These victims then receive what appear at first glance to be identical emails, with only the recipient address and the attachment having been changed. Instead of the invoice, the criminals send .zip files with the same name that contain malware. Our data based on the meta information collected in 32Guards shows the approach of the spammers as well as the distinctive features of phishing emails – and how you can protect your email address from misuse.