Digitization has also led to fundamental changes in the legal and administrative sectors. One of the most important developments was the introduction of the Electronic Court and Administration Mailbox (EGVP), which enabled the secure exchange of documents between citizens, companies, lawyers, authorities, and courts. The EGVP has since been replaced by specialized electronic mailboxes such as beA, beN, beBPo, beSt, and eBO—each with a clearly defined scope of application. The following overview shows the development from the original EGVP to today’s solutions and explains how they work in practice.
The used car trade is booming like never before—especially online. The multitude of platforms and digital marketplaces makes business easier, but also attracts criminals. Prospective buyers are always potential targets for fraudsters who use increasingly sophisticated scams to try to obtain money or sensitive data. One particularly dangerous scam is phishing with fake car catalogs. Victims receive seemingly professional offers in the mail, but these are actually the work of organized cybercriminals.
On Monday, September 8, 2025, a significant attack on the software package supply chain for the widely used JavaScript runtime environment node.js was discovered. There is no danger for NoSpamProxy customers.
The term VS-NfD is often used in connection with the secure handling of sensitive information in government agencies and companies. In our blog article, you will learn what VS-NfD is, why knowledge of it can be essential for your IT security, and how NoSpamProxy can also protect your organization.
Email remains the number one gateway for cyberattacks. Whether phishing, malware, or targeted manipulation—the threats are constantly evolving. This makes it all the more important for companies to regularly review their email security. Email penetration tests are an effective way to do this. They simulate real attack scenarios and uncover vulnerabilities. This gives organizations a clear assessment of how resilient their communications infrastructure really is – and where urgent improvements are needed.
Cybercriminals are using increasingly sophisticated methods to attack companies and individuals via email. They often cleverly disguise their threats in seemingly harmless attachments or links. Conventional virus scanners are increasingly reaching their limits, as new, unknown malware can slip past them. This is where the concept of sandboxing comes in. Suspicious email content is executed in an isolated, virtual test environment so that even unknown attacks can be detected and repelled before they cause damage. In this blog article, you will learn how sandboxing works as an integral part of modern email security strategies, why it is indispensable in times of zero-day threats, and how the 32Guards Sandbox can provide you with lasting protection.
One of the most dangerous tactics used in cyber attacks is to send seemingly harmless links in emails that only lead to phishing sites or malware after they have been received. Traditional spam filters and virus scanners quickly reach their limits here, as they only check emails once when they are received. But what happens if the link later becomes dangerous? This is exactly where Time-of-Click Protection (ToC Protection) comes in. In this article, we show you how Time-of-Click Protection works, why it is indispensable for companies, and how it is integrated into URL Safeguard in NoSpamProxy.
Since the introduction of DMARC (Domain-based Message Authentication, Reporting and Conformance) in 2015, the protocol has established itself as an integral part of email security. However, with the increasing complexity of email infrastructures and ever new requirements for interoperability and clarity, it was time for an update. This update is called DMARCbis and brings with it some significant changes.
NoSpamProxy
Categories
Latest News
NIS2 – What the directive means for you (Update 2026)29.01.2026 - 10:38
How cloaking disguises phishing attacks23.01.2026 - 09:45







