Skip to content
March 18, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • AI
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • Claude Code

Tag: Claude Code

  • AI
45 minutes ago

AI Is Flooding Open Source — And Most of It Won’t Survive (2026)

The Pattern Has Been Here Before When AWS made servers cheap, everyone became a cloud startup. When no-code tools made apps cheap, everyone became a founder. Now AI has made writing software cheap — and everyone has become an open source maintainer. The result is the fastest expansion of GitHub repositories in its history. Most…

Read More
Shekhar Suman08 mins

Author Info

Shekhar Suman

Security isn't a feature. It's an architecture decision.

-----

I'm Shekhar Suman — a cybersecurity professional and trainer with over a 15 years of experience in Offensive and Defensive security. I work with organizations to harden their security architecture and with teams to build the mindset that makes it stick.

This blog is where I think out loud about the problems worth solving.

-----

All views expressed here are personal and do not reflect my employer's prospective.

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • OT Security
  • Secure SDLC
  • Web Security

Recent Posts

  • AI Is Flooding Open Source — And Most of It Won’t Survive (2026)
  • CVE-to-OT Impact Translator – COIT
  • LANCE: An Open Source Framework for Automated Red Teaming of LLMs (2025)
  • Jailbreaking vs. Prompt Injection: Same Problem, Different Names — Or Is It?
  • End-to-End LLM Security Architecture: How All the Defenses Fit Together

Recent Comments

  1. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm
  2. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  3. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  4. Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  5. Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough

Archives

  • March 2026
  • February 2026
  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
iosec.in Powered By BlazeThemes.