Currently, a security vulnerability exists in a widely used JsonWebToken library. Under certain conditions, attackers can distribute and execute malicious code remotely. There is no danger for NoSpamProxy customers.
For many years, NoSpamProxy has had a direct connection to the SwissSign trust centre. We are currently working on the migration of NoSpamProxy to the new Managed PKI Service from SwissSign. The NoSpamProxy team is already in close contact with SwissSign and is currently working on the migration schedule and other details.
Gain an overview of all NoSpamProxy modules with our webcasts. In this session, we will present practical examples of solutions and you will have the opportunity to ask specific questions. The webcast participation is part of the partner certification for new partners. But even if you have been a partner for some time, we recommend that you attend at least once a year to keep up to date.
You have questions about version 14.0? Then you should visit our consultation hour. After a 10-minute overview of what’s new in version 14, you’ll have about 45 minutes for the interactive Q&A session, where you can ask your open questions and discuss them with our experts.
In some cases, certificates already issued by SwissSign were withdrawn because in these cases the Common Name (CN) did not correspond to the prescribed first name last name format. We show you how to apply for new certificates for the affected users.
As of April 1, 2022, the requirements for email certificates will be tightened. SwissSign will stop issuing e-mail certificates with a 3-year term in March 2022. Only e-mail certificates with a validity of one or two years will then be available. Certificates with a validity of 3 years issued before April 1 will remain valid after the cut-off date and will not be revoked.
Since this week, we have been noticing a new wave of attacks with RTF documents, where spammers use various “file type evasion tricks”.