Skip to content
Hot News

Breaking Down the Salesloft–Drift Breach (UNC6395) Through the Cyber Kill Chain

The Future of VPNs for Small Businesses

Charon Ransomware: The New Stealth Cyber Threat SMBs Can’t Ignore

From Click to Crisis: The Phishing Email That Cost $2 Million

SOC 1 Audit Prep: Your Pre-Flight Checklist for Compliance Takeoff

Who is Hacking Behind the Scenes and Why?

Black Swamp InfoSec
Black Swamp InfoSec

Security Sidekicks Helping you Navigate the Swamp

  • Home
  • New Topics
    • Cybersecurity Threats
    • Business
    • Politics
    • Technology
    • Blog
    • Topics
  • Resources
    • Useful links
    • Downloads
    • Tutorials
  • About Us
  • Contact
  • Privacy
Main Menu
  • Home
  • New Topics
    • Cybersecurity Threats
    • Business
    • Politics
    • Technology
    • Blog
    • Topics
  • Resources
    • Useful links
    • Downloads
    • Tutorials
  • About Us
  • Contact
  • Privacy
Sunday, October 26, 2025

Jordan Trace

I am a passionate IT cybersecurity professional with a deep commitment to educating individuals and organizations about the evolving threats in the digital world. With a background in network security and ethical hacking, covering a wide range of cybersecurity topics, from emerging vulnerabilities and malware trends to best practices in data protection.

  • Cybersecurity Threats

Who is Hacking Behind the Scenes and Why?

Cyber attackers come in a variety of forms and sources. Conventional military attacking uses traditional kinetic forces attacking or defending one another. In the cyber domain it can sometimes be impo...

Jordan Trace
August 11, 2025
Read More
  • Blog

Government Overwatch and Exploiting Information Systems 

I. The ability to intercept communications between commercial data centers operated by Google and Yahoo! by tapping undersea communications cables:  The idea of tampering with communications cables is...

Jordan Trace
July 27, 2025
Read More
  • Blog
  • Technology

China’s Massistant Tool Covertly Harvests SMS, GPS Data, and Images From Seized Phones

Cybersecurity Researchers Expose China’s Massistant Mobile Forensics Tool Cybersecurity experts have uncovered details about a mobile forensics tool known as Massistant, used by Chinese law enforcemen...

Jordan Trace
July 19, 2025
Read More
A female engineer using a laptop while monitoring data servers in a modern server room.
  • Blog

Cybersecurity for SMBs: A Complete Guide to Building Resilience in 2025

Small and midsize businesses (SMBs) are increasingly targeted by cybercriminals, yet most lack the resources or strategic approach necessary to defend against cyber threats. This paper outlines a comp...

Jordan Trace
July 4, 2025
Read More
Black Swamp InfoSec
Need help protecting your business? Black Swamp InfoSec offers practical, affordable cybersecurity consulting tailored to small and midsize businesses. Let us help you stay safe, stay compliant, and stay focused on what you do best.

Email: info@BlackSwampInfoSec.com

  • (no title)
  • About
  • Blog
  • Categories
  • Contact
  • Downloads
  • Home
  • Privacy
  • Tutorials
  • Useful Links

Category List

  • Blog(10)
  • Business(9)
  • Cybersecurity Threats(6)
  • Politics(2)
  • Technology(9)

Featured Posts

1
Breaking Down the Salesloft–Drift Breach (UNC6395) Through the Cyber Kill Chain
September 9, 2025
2
The Future of VPNs for Small Businesses
August 31, 2025
3
Charon Ransomware: The New Stealth Cyber Threat SMBs Can’t Ignore
August 19, 2025

Copyright © 2025 Black Swamp InfoSec. All rights reserved.

Business inquiries: info@blackswampinfosec.com