Front 2 Back IT
  • Front 2 Back IT
  • Home
  • Services
    • Penetration Testing
    • Data Security and Compliance
    • Disaster Recovery Planning
    • Network Security
    • WebPage Security
    • Cloud Security
    • AI & Machine Learning Security
    • Phish Testing
    • Security Training
    • Web & Email Hosting
    • IT Support
    • Cyber Intelligence & Threat Monitoring
  • Information
    • About
    • Contact Us
    • Join Us
    • Privacy Policy
    • Hosting
    • Cookies Policy
    • Newsletter Signup
  • Blog
    • How to Identify a Phishing Website
  • Support
    • Submit a Ticket
    • Check a Previous Ticket
Front 2 Back IT

We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.

Newsletter

Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.

Subscribe

Latest Security News

Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks

Over 1,300 Microsoft SharePoint servers exposed online remain unpatched against a spoofing vulnerability that was exploited as a zero-day an…

Read more → 22 Apr 2026
New GoGra malware for Linux uses Microsoft Graph API for comms

A Linux variant of the GoGra backdoor uses legitimate Microsoft infrastructure, relying on an Outlook inbox for stealthy payload delivery. […

Read more → 22 Apr 2026
French govt agency confirms breach as hacker offers to sell data

France Titres, the government agency in France for issuing and managince administrative documents has disclosed a data breach after a threat…

Read more → 21 Apr 2026
Microsoft releases emergency patches for critical ASP.NET flaw

Microsoft has released out-of-band (OOB) security updates to patch a critical ASP.NET Core privilege escalation vulnerability. [...]…

Read more → 22 Apr 2026
New Lotus data wiper used against Venezuelan energy, utility firms

A previously undocumented data-wiping malware dubbed Lotus was used last year in targeted attacks against energy and utilities organizations…

Read more → 21 Apr 2026
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate priv…

Read more → 22 Apr 2026
Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that's distributed via a theme related to India'…

Read more → 22 Apr 2026
Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code executio…

Read more → 22 Apr 2026
SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy m…

Read more → 21 Apr 2026
22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters

Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that …

Read more → 21 Apr 2026
Cyber chief: UK faces "perfect storm" for cyber security

As the technology landscape develops, the definition of cyber security is expanding with it.…

Read more → 21 Apr 2026
UK exposes Russian military intelligence hijacking vulnerable routers for cyber attacks

New advisory warns cyber threat group APT28 have exploited vulnerable edge devices to support malicious operations.…

Read more → 07 Apr 2026
APT28 exploit routers to enable DNS hijacking operations

Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and auth…

Read more → 07 Apr 2026
NCSC warns of messaging app targeting

The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.…

Read more → 31 Mar 2026
Vulnerability affecting F5 BIG-IP APM

The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Polic…

Read more → 30 Mar 2026
ISC Stormcast For Wednesday, April 22nd, 2026 https://isc.sans.edu/podcastdetail/9902, (Wed, Apr 22nd) Read more → 22 Apr 2026
[Guest Diary] Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot Incident, (Wed, Apr 22nd)

&&#x23&#x3b;x26&#x3b;&#x23&#x3b;x5b&#x3b;This is a Guest Diary by L. Carty, an ISC intern as part of the SANS.edu Bachelor&&#x23&#x3b;x26&#…

Read more → 22 Apr 2026
A .WAV With A Payload, (Tue, Apr 21st)

There have been reports of threat actors using a .wav file as a vector for malware.
…

Read more → 21 Apr 2026
ISC Stormcast For Tuesday, April 21st, 2026 https://isc.sans.edu/podcastdetail/9900, (Tue, Apr 21st) Read more → 21 Apr 2026
Handling the CVE Flood With EPSS, (Mon, Apr 20th)

Every morning, security people around the world face the same ritual: opening their vulnerability feed to find a lot of new CVE entries tha…

Read more → 20 Apr 2026
Read more →

Contact Us

Front 2 Back IT Unit 16, Peachley Farm Business Park Lower Broadheath Worcestershire WR2 6QR

Phone: +44(0)1905 886233


(C) 2026 Front 2 Back IT
  • Privacy Policy
  • About Us
  • Contact
  • Front 2 Back IT
  • Home
  • Services
    • Penetration Testing
    • Data Security and Compliance
    • Disaster Recovery Planning
    • Network Security
    • WebPage Security
    • Cloud Security
    • AI & Machine Learning Security
    • Phish Testing
    • Security Training
    • Web & Email Hosting
    • IT Support
    • Cyber Intelligence & Threat Monitoring
  • Information
    • About
    • Contact Us
    • Join Us
    • Privacy Policy
    • Hosting
    • Cookies Policy
    • Newsletter Signup
  • Blog
    • How to Identify a Phishing Website
  • Support
    • Submit a Ticket
    • Check a Previous Ticket