Skip to content
February 21, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • AI

Category: AI

  • AI
14 hours ago

Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough

If you’ve been in application security for any amount of time, you’ve seen this pattern before. A new technology arrives. Developers adopt it fast. Security teams scramble to catch up. And in the gap between adoption and understanding, attackers find a comfortable home. We saw it with cloud misconfigurations. We saw it with GraphQL. We’re…

Read More
Shekhar Suman019 mins
prompt injection attack path

Author Info

Shekhar Suman

He specializes in secure software engineering, helping teams integrate security across the SDLC. His work includes application security assessments, threat modeling, penetration testing, and security architecture, with an emphasis on risk-driven design and long-term resilience.
-----
All the views expressed here is his personal and doesn't necessarily resonate with his professional role.

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • Secure SDLC
  • Web Security

Recent Posts

  • Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  • Failure of Secure SDLC: Why Vulnerabilities Still Ship
  • Passing GIAC Security Leadership (GSLC) Exam
  • CSSLP: A Journey of Relearning How Security Should Be Built
  • Dissecting Akira Ransomware: Techniques, Payloads, and Lessons Learned

Recent Comments

  1. Passing GIAC Security Leadership (GSLC) Exam - IOSEC.IN on CSSLP: A Journey of Relearning How Security Should Be Built
  2. Akira Ransomware: Techniques, Payloads on Ransomware 101: Understanding the Threat
  3. Insecure Deserialization in .NET: Risk and Fixing Legacy Code - iosec.in on Insecure Deserialization: A Silent Killer in Modern Applications
  4. un on Form based SQL Injection with Sqlmap
  5. Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !! – iosec.in on CSV Macro Injection

Archives

  • February 2026
  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • Secure SDLC
  • Web Security
iosec.in Powered By BlazeThemes.