Vonahi Security's Blog
  • Vonahi Security Home
  • Blog
  • Weekly Threat Reports
Alton Johnson

Alton Johnson

Alton Johnson is the Founder and Principal Security Consultant at Vonahi Security. Alton has contributed to Metasploit Framework and Kali Linux, and currently holds his eCPPT, OSCP, and OSCE certs.

Atlanta, GA •
18 posts •
#1 Best Pitch for Smoking Hot Tech
community outreach

#1 Best Pitch for Smoking Hot Tech

Vonahi Security wins Channel Program's Best July Pitch and sets the record for the most demo requests and product reviews.

  • Alton Johnson
    Alton Johnson
3 min read
Respect in Security
best practices

Respect in Security

At Vonahi Security, we believe every one deserves to be supported and encouraged to be unique individuals. We strive to create a welcoming and inclusive environment for all, driven by behavior that shows empathy, respect, and care for others. We stand by the Respect in Security pledge.

  • Alton Johnson
    Alton Johnson
3 min read
Avoiding SMB Rate Limits During Authentication Attacks
penetration testing

Avoiding SMB Rate Limits During Authentication Attacks

Here's a quick workaround for when you get rate limited during a password attack against the SMB service.

  • Alton Johnson
    Alton Johnson
5 min read
13 Freaky Infosec Facts
research

13 Freaky Infosec Facts

13 freaky infosec facts that show how freaky and deadly technology can get.

  • Alton Johnson
    Alton Johnson
  • Erik Wynter
    Erik Wynter
5 min read
Penetration testing... on a new level
penetration testing

Penetration testing... on a new level

vPenTest simplifies the process of identifying new threats within your environment on an on-going basis without the traditional challenges and concerns.

  • Alton Johnson
    Alton Johnson
3 min read
Top 5 Ways to Secure Your Online Accounts
best practices

Top 5 Ways to Secure Your Online Accounts

Here are our top 5 recommendations for securing your online accounts as your digital footprint continues to grow.

  • Alton Johnson
    Alton Johnson
3 min read
Post-Exploitation with Leprechaun
post-exploitation

Post-Exploitation with Leprechaun

Finding valuable data during post-exploitation can be a challenge. Leprechaun helps solve this problem.

  • Alton Johnson
    Alton Johnson
5 min read
Getting the Most out of Your Network Penetration Test
ciso

Getting the Most out of Your Network Penetration Test

Most organizations don't maximize the opportunities presented during a security assessment. Let's discuss what some of those are.

  • Alton Johnson
    Alton Johnson
3 min read
Taking Over IPv6 Networks
penetration testing

Taking Over IPv6 Networks

Let's take a deeper look at how rogue DHCPv6 servers can lead to a successful attack against IPv6 networks.

  • Alton Johnson
    Alton Johnson
7 min read
Penetration Test vs Vulnerability Assessment: What's the difference?
faq

Penetration Test vs Vulnerability Assessment: What's the difference?

Understanding the difference between a penetration test and a vulnerability assessment could significantly impact your perspective of security at your organization. Learn more.

  • Alton Johnson
    Alton Johnson
4 min read
Cybercriminals are still targeting RDP services
research

Cybercriminals are still targeting RDP services

Unnecessary public-facing services is a common issue that many organizations face. Learn more about how these services, such as RDP, could pose a threat.

  • Alton Johnson
    Alton Johnson
3 min read
Exploiting the Human Factor
social engineering

Exploiting the Human Factor

Employees are the biggest threat to an organization's critical information systems and confidential data. We focus on four core areas in this blog.

  • Alton Johnson
    Alton Johnson
3 min read
What is WPA3 and What Do I Need to Know?
faq

What is WPA3 and What Do I Need to Know?

The Wi-Fi Alliance has announced the release of WPA3. Check out some of its features and what your organization needs to know to get prepared.

  • Alton Johnson
    Alton Johnson
4 min read
NOLA SPAWAR Cyber Security Camp for Kids 2018
community outreach

NOLA SPAWAR Cyber Security Camp for Kids 2018

Vonahi Security partnered with the US Navy's SPAWAR during their Cyber Security Camp for Kids at Southern University at New Orleans event. Take a look at how it went.

  • Alton Johnson
    Alton Johnson
2 min read
Preparing for Your First Physical Penetration Test
physical security

Preparing for Your First Physical Penetration Test

Conducting a physical penetration test for the first time can be an intimidating process. Read more on how to properly prepare.

  • Alton Johnson
    Alton Johnson
3 min read
Top 4 Ways to Secure Your WordPress Installation
best practices

Top 4 Ways to Secure Your WordPress Installation

WordPress is one of the most used content management systems (CMS) used in today's age. Learn how to keep it secure from the most common threats.

  • Alton Johnson
    Alton Johnson
5 min read
How Opening a PDF Could Leak Your Account Credentials
best practices

How Opening a PDF Could Leak Your Account Credentials

Opening a malicious PDF could result in the leakage of your user account credentials. Check out our blog to understand why this could put your data at risk.

  • Alton Johnson
    Alton Johnson
3 min read
Detecting and Preventing Common Microsoft Office Exploits
best practices

Detecting and Preventing Common Microsoft Office Exploits

Can your organization protect against the latest Microsoft Dynamic Data Exchange (DDE) and Macro Security Exploits? Read on for more information.

  • Alton Johnson
    Alton Johnson
7 min read
Vonahi Security's Blog © 2023
Latest Posts Facebook Twitter LinkedIn GitHub