An accidentally deleted SPF entry, an unsuspecting email administrator, and weeks of undetected delivery problems—what sounds like a worst-case scenario actually happened. The case shows how 25Reports not only makes problems visible, but also enables them to be quickly resolved.
URL rewriting promises protection against phishing attacks by rewriting URLs in incoming emails and rechecking them every time they are clicked. Link wrapping attacks specifically exploit URL rewriting in emails. Learn how these attacks work and how you can effectively protect yourself against them.
Imagine a burglar breaking into your house without leaving any footprints or fingerprints. That’s exactly how fileless malware operates: invisible to traditional security systems, but extremely dangerous. In our blog article, you can find out what fileless malware is and how you can defend yourself against attacks.
The university network benefits from reliable protection against spam, malware, phishing, and other threats, as well as convenient email encryption. Automatic certificate management for DFN/HARICA greatly reduces IT costs.
Every day, companies fall victim to email abuse, and the consequences are serious: damage to reputation, blocked communication, and, last but not least, financial losses. This is exactly where Flow Guard from NoSpamProxy comes in: it acts as an automatic shield before damage can occur.
Every day, millions of unwanted emails are sent over the internet. Spam filters do their best to block these emails, but some unwanted messages still find their way into our inboxes. There is a frequently overlooked but effective protective measure against spam: greylisting. The principle behind greylisting is to save time. With greylisting, emails are initially rejected and only accepted after a second delivery attempt. In addition, greylisting separates legitimate mail servers from those that do not comply with the relevant RFCs.
In this article, you will learn how greylisting works, why it is still an integral part of modern spam protection today, and why the intelligent greylisting in NoSpamProxy is particularly effective.
Whaling is a form of phishing that targets the “big fish” in a company, i.e., CEOs and other executives who have power, money, information, and influence. In our blog article, you can find out what whaling is, how it works, and how you can protect yourself and your company from whaling.
Digitization has also led to fundamental changes in the legal and administrative sectors. One of the most important developments was the introduction of the Electronic Court and Administration Mailbox (EGVP), which enabled the secure exchange of documents between citizens, companies, lawyers, authorities, and courts. The EGVP has since been replaced by specialized electronic mailboxes such as beA, beN, beBPo, beSt, and eBO—each with a clearly defined scope of application. The following overview shows the development from the original EGVP to today’s solutions and explains how they work in practice.
NoSpamProxy
Categories
Latest News
Link wrapping as an attack vector05.01.2026 - 10:02
React vulnerability: NoSpamProxy is not affected12.12.2025 - 13:00








