Front 2 Back IT
  • Front 2 Back IT
  • Home
  • Services
    • Penetration Testing
    • Data Security and Compliance
    • Disaster Recovery Planning
    • Network Security
    • WebPage Security
    • Cloud Security
    • AI & Machine Learning Security
    • Phish Testing
    • Security Training
    • Web & Email Hosting
    • IT Support
    • Cyber Intelligence & Threat Monitoring
  • Information
    • About
    • Contact Us
    • Join Us
    • Privacy Policy
    • Hosting
    • Cookies Policy
    • Newsletter Signup
  • Blog
    • How to Identify a Phishing Website
  • Support
    • Submit a Ticket
    • Check a Previous Ticket

Cookies Policy

Cookie Policy

This Cookie Policy explains how Front 2 Back IT (“we”, “our”, “us”) uses cookies and similar technologies on our website.

What Are Cookies?

Cookies are small text files stored on your device when you visit a website. They help websites function properly, improve user experience, and provide information to site owners.

Types of Cookies We Use

  • Strictly Necessary Cookies: These are essential for the operation of our website. For example, session cookies that maintain login state or Grav admin cookies that remember interface preferences. These do not require consent.
  • Performance & Analytics Cookies: If enabled, these help us understand how visitors use our site (e.g. Google Analytics). They require your consent.
  • Functionality Cookies: These remember your preferences (such as language or region) to provide a more personalised experience.
  • Marketing Cookies: If used, these track browsing habits to deliver relevant advertising. They require your consent.

Managing Cookies

You can control and manage cookies through your browser settings. Most browsers allow you to refuse cookies or delete them. Please note that disabling essential cookies may affect the functionality of our website.

Consent

When you first visit our site, you may be presented with a cookie banner

Front 2 Back IT

We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.

Newsletter

Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.

Latest Security News

Google adds ‘Advanced Flow’ for safe APK sideloading on Android

Google has announced a new mechanism in Android called Advanced Flow that will allow sideloading APKs from unverified developers for power u…

Read more → 21 Mar 2026
Trivy vulnerability scanner breach pushed infostealer via GitHub Actions

The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed credential-ste…

Read more → 21 Mar 2026
Microsoft Azure Monitor alerts abused for callback phishing attacks

Microsoft Azure Monitor alerts are being abused to send callback phishing emails that impersonate warnings from the Microsoft Security Team …

Read more → 21 Mar 2026
FBI links Signal phishing attacks to Russian intelligence services

The FBI has issued a public service announcement warning that Russian intelligence-linked threat actors are actively targeting users of encr…

Read more → 20 Mar 2026
VoidStealer malware steals Chrome master key via debugger trick

An information stealer called VoidStealer uses a new approach to bypass Chrome's Application-Bound Encryption (ABE) and extract the master k…

Read more → 22 Mar 2026
FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging application…

Read more → 21 Mar 2026
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Oracle has released security updates to address a critical security flaw impacting Identity Manager and Web Services Manager that could be e…

Read more → 21 Mar 2026
Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that h…

Read more → 21 Mar 2026
CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel…

Read more → 21 Mar 2026
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to …

Read more → 20 Mar 2026
International security chiefs to convene in Glasgow for flagship CYBERUK conference

CYBERUK will be delivered by the NCSC and sponsors across four distinct tracks of activity: Resilience, Technology, Threat, and Ecosystem.…

Read more → 12 Mar 2026
Alert: NCSC advises UK organisations to take action following conflict in the Middle East

In response to the evolving events in the Middle East, the NCSC is advising that UK organisations review their cyber security posture.…

Read more → 02 Mar 2026
Exploitation of Cisco Catalyst SD-WAN

Agencies strongly encourage immediate investigation of potential compromise of Cisco Catalyst SD-WAN.…

Read more → 25 Feb 2026
Pro-Russia hacktivist activity continues to target UK organisations

The NCSC encourages local government and critical infrastructure operators to harden their ‘denial of service’ (DoS) defences…

Read more → 19 Jan 2026
NCSC issues warning over hacktivist groups disrupting UK organisations and online services

Russian‑aligned hacktivist groups continue to target UK organisations with disruptive cyber attacks…

Read more → 19 Jan 2026
GSocket Backdoor Delivered Through Bash Script, (Fri, Mar 20th)

Yesterday, I discovered a malicious Bash script that installs a GSocket backdoor on the victim&#x27s computer. I don&#x27t know the source …

Read more → 20 Mar 2026
ISC Stormcast For Friday, March 20th, 2026 https://isc.sans.edu/podcastdetail/9858, (Fri, Mar 20th) Read more → 20 Mar 2026
ISC Stormcast For Thursday, March 19th, 2026 https://isc.sans.edu/podcastdetail/9856, (Thu, Mar 19th) Read more → 19 Mar 2026
Interesting Message Stored in Cowrie Logs, (Wed, Mar 18th)

This activity was found and reported by BACS student Adam Thorman as part of one of his assignments which I posted his final pap…

Read more → 19 Mar 2026
Scans for "adminer", (Wed, Mar 18th)

A very popular target of attackers scanning our honeypots is "phpmyadmin". phpMyAdmin is a script first released in the late 90s, before ma…

Read more → 18 Mar 2026
Read more →

Contact Us

Front 2 Back IT Unit 16, Peachley Farm Business Park Lower Broadheath Worcestershire WR2 6QR

Phone: +44(0)1905 886233

E-mail:


(C) 2026 Front 2 Back IT
  • Front 2 Back IT
  • Home
  • Services
    • Penetration Testing
    • Data Security and Compliance
    • Disaster Recovery Planning
    • Network Security
    • WebPage Security
    • Cloud Security
    • AI & Machine Learning Security
    • Phish Testing
    • Security Training
    • Web & Email Hosting
    • IT Support
    • Cyber Intelligence & Threat Monitoring
  • Information
    • About
    • Contact Us
    • Join Us
    • Privacy Policy
    • Hosting
    • Cookies Policy
    • Newsletter Signup
  • Blog
    • How to Identify a Phishing Website
  • Support
    • Submit a Ticket
    • Check a Previous Ticket