Front 2 Back IT
  • Front 2 Back IT
  • Home
  • Services
    • Penetration Testing
    • Data Security and Compliance
    • Disaster Recovery Planning
    • Network Security
    • WebPage Security
    • Cloud Security
    • AI & Machine Learning Security
    • Phish Testing
    • Security Training
    • Web & Email Hosting
    • IT Support
    • Cyber Intelligence & Threat Monitoring
  • Information
    • About
    • Contact Us
    • Join Us
    • Privacy Policy
    • Hosting
    • Cookies Policy
    • Newsletter Signup
  • Blog
    • How to Identify a Phishing Website
  • Support
    • Submit a Ticket
    • Check a Previous Ticket
Front 2 Back IT

We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.

Newsletter

Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.

Latest Security News

CloudZ malware abuses Microsoft Phone Link to steal SMS and OTPs

A new version of the CloudZ remote access tool (RAT) is deploying a previously unseen malicious plugin called Pheno that hijacks the Microso…

Read more → 05 May 2026
ScarCruft hackers push BirdCall Android malware via game platform

The North Korean hacker group APT37 has been delivering an Android version of a backdoor called BirdCall in a supply-chain attack through a …

Read more → 05 May 2026
Karakurt extortion gang ‘cold case’ negotiator gets 8.5 years in prison

A Latvian national extradited to the United States was sentenced to 8.5 years in prison for his "cold case" negotiator role in the Russian K…

Read more → 05 May 2026
Weaver E-cology critical bug exploited in attacks since March

Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run disco…

Read more → 04 May 2026
Amazon SES increasingly abused in phishing to evade detection

The Amazon Simple Email Service (SES) is being increasingly abused to send convincing phishing emails that can bypass standard security filt…

Read more → 04 May 2026
We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is

While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption…

Read more → 05 May 2026
ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage a…

Read more → 05 May 2026
Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come und…

Read more → 05 May 2026
Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures …

Read more → 05 May 2026
Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and Man…

Read more → 04 May 2026
NCSC: Leave passwords in the past - passkeys are the future

Passkeys are the more secure and user-friendly login method and should be the default authentication option for consumers.…

Read more → 23 Apr 2026
International cyber agencies share fresh advice to defend against China-linked covert networks

New advisory highlights how to defend against attacker tactics believed to be used by China-linked actors to hide malicious cyber activity.…

Read more → 23 Apr 2026
Executive Summary: Defending against China-nexus covert networks of compromised devices

Organisations should map and baseline their edge device traffic, especially VPN and remote access connections, and adopt dynamic threat feed…

Read more → 23 Apr 2026
Defending against China-nexus covert networks of compromised devices

Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of compromised infrastructure, and how to defe…

Read more → 23 Apr 2026
World-first NCSC-engineered device secures vulnerable display links

SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and Display Port connections.…

Read more → 22 Apr 2026
SSL.com rotates their root certificate today, (Tue, May 5th)

I just got an email from SSL.com last night, they are rotating &&#x23&#x3b;x26&#x3b;&#x23&#x3b;xc2&#x3b;&&#x23&#x3b;x26&#x3b;&#x23&#x3b;xa0…

Read more → 05 May 2026
ISC Stormcast For Tuesday, May 5th, 2026 https://isc.sans.edu/podcastdetail/9918, (Tue, May 5th) Read more → 05 May 2026
TeamPCP Weekly Analysis: 2026-W18 (2026-04-27 through 2026-05-03), (Mon, May 4th)

Summary
…

Read more → 04 May 2026
DShield Honeypot Update, (Mon, May 4th)

This week, I will release a few updates to our DShield honeypot. The update should happen automatically if you have "automatic updates" ena…

Read more → 04 May 2026
ISC Stormcast For Monday, May 4th, 2026 https://isc.sans.edu/podcastdetail/9916, (Mon, May 4th) Read more → 04 May 2026
Read more →

Contact Us

Front 2 Back IT Unit 16, Peachley Farm Business Park Lower Broadheath Worcestershire WR2 6QR

Phone: +44(0)1905 886233

E-mail:


(C) 2026 Front 2 Back IT
  • Privacy Policy
  • About Us
  • Contact
  • Front 2 Back IT
  • Home
  • Services
    • Penetration Testing
    • Data Security and Compliance
    • Disaster Recovery Planning
    • Network Security
    • WebPage Security
    • Cloud Security
    • AI & Machine Learning Security
    • Phish Testing
    • Security Training
    • Web & Email Hosting
    • IT Support
    • Cyber Intelligence & Threat Monitoring
  • Information
    • About
    • Contact Us
    • Join Us
    • Privacy Policy
    • Hosting
    • Cookies Policy
    • Newsletter Signup
  • Blog
    • How to Identify a Phishing Website
  • Support
    • Submit a Ticket
    • Check a Previous Ticket