Front 2 Back IT
  • Front 2 Back IT
  • Home
  • Services
    • Penetration Testing
    • Data Security and Compliance
    • Disaster Recovery Planning
    • Network Security
    • WebPage Security
    • Cloud Security
    • AI & Machine Learning Security
    • Phish Testing
    • Security Training
    • Web & Email Hosting
    • IT Support
    • Cyber Intelligence & Threat Monitoring
  • Information
    • About
    • Contact Us
    • Join Us
    • Privacy Policy
    • Hosting
    • Cookies Policy
    • Newsletter Signup
  • Blog
    • How to Identify a Phishing Website
  • Support
    • Submit a Ticket
    • Check a Previous Ticket

Support

Front 2 Back IT

We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.

Newsletter

Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.

Latest Security News

Stolen Rockstar Games analytics data leaked by extortion gang

Rockstar Games has suffered a data breach linked to a recent security incident at Anodot, with the ShinyHunters extortion gang now leaking t…

Read more → 13 Apr 2026
FBI takedown of W3LL phishing service leads to developer arrest

The FBI Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arre…

Read more → 13 Apr 2026
OpenAI rotates macOS certs after Axios attack hit code-signing workflow

OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package du…

Read more → 13 Apr 2026
European Gym giant Basic-Fit data breach affects 1 million members

Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its cus…

Read more → 13 Apr 2026
Critical flaw in wolfSSL library enables forged certificate use

A critical vulnerability in the wolfSSL SSL/TLS library can weaken security via improper verification of the hash algorithm or its size when…

Read more → 13 Apr 2026
Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns rea…

Read more → 14 Apr 2026
Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while …

Read more → 14 Apr 2026
108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate wi…

Read more → 14 Apr 2026
ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under a…

Read more → 14 Apr 2026
CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerab…

Read more → 14 Apr 2026
UK exposes Russian military intelligence hijacking vulnerable routers for cyber attacks

New advisory warns cyber threat group APT28 have exploited vulnerable edge devices to support malicious operations.…

Read more → 07 Apr 2026
APT28 exploit routers to enable DNS hijacking operations

Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and auth…

Read more → 07 Apr 2026
NCSC warns of messaging app targeting

The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.…

Read more → 31 Mar 2026
Vulnerability affecting F5 BIG-IP APM

The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Polic…

Read more → 30 Mar 2026
Vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway

UK organisations encouraged to take immediate action to mitigate two recently disclosed vulnerabilities affecting Citrix NetScaler ADC and C…

Read more → 25 Mar 2026
ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th) Read more → 14 Apr 2026
Scans for EncystPHP Webshell, (Mon, Apr 13th)

Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that us…

Read more → 13 Apr 2026
ISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th) Read more → 13 Apr 2026
Obfuscated JavaScript or Nothing, (Thu, Apr 9th)

I spotted an interesting piece of JavaScript code that was delivered via a phishing email in a RAR archive. The file was called â&#x80…

Read more → 10 Apr 2026
ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th) Read more → 09 Apr 2026
Read more →

Contact Us

Front 2 Back IT Unit 16, Peachley Farm Business Park Lower Broadheath Worcestershire WR2 6QR

Phone: +44(0)1905 886233

E-mail:


(C) 2026 Front 2 Back IT
  • Privacy Policy
  • About Us
  • Contact
  • Front 2 Back IT
  • Home
  • Services
    • Penetration Testing
    • Data Security and Compliance
    • Disaster Recovery Planning
    • Network Security
    • WebPage Security
    • Cloud Security
    • AI & Machine Learning Security
    • Phish Testing
    • Security Training
    • Web & Email Hosting
    • IT Support
    • Cyber Intelligence & Threat Monitoring
  • Information
    • About
    • Contact Us
    • Join Us
    • Privacy Policy
    • Hosting
    • Cookies Policy
    • Newsletter Signup
  • Blog
    • How to Identify a Phishing Website
  • Support
    • Submit a Ticket
    • Check a Previous Ticket