Skip to content
March 14, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • AI
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • ics-security

Tag: ics-security

  • OT Security
17 hours ago17 hours ago

CVE-to-OT Impact Translator – COIT

Why NVD Lies to OT Engineers — And the Tool Built to Fix It There is a question every OT security engineer has asked at least once, usually at 11pm after a vendor advisory lands in their inbox. “This CVE is a 10.0. But what does that actually mean for my plant?” The answer NVD…

Read More
Shekhar Suman016 mins
COIT

Author Info

Shekhar Suman

Security isn't a feature. It's an architecture decision.

-----

I'm Shekhar Suman — a cybersecurity professional and trainer with over a 15 years of experience in Offensive and Defensive security. I work with organizations to harden their security architecture and with teams to build the mindset that makes it stick.

This blog is where I think out loud about the problems worth solving.

-----

All views expressed here are personal and do not reflect my employer's prospective.

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • OT Security
  • Secure SDLC
  • Web Security

Recent Posts

  • CVE-to-OT Impact Translator – COIT
  • LANCE: An Open Source Framework for Automated Red Teaming of LLMs (2025)
  • Jailbreaking vs. Prompt Injection: Same Problem, Different Names — Or Is It?
  • End-to-End LLM Security Architecture: How All the Defenses Fit Together
  • Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm

Recent Comments

  1. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm
  2. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  3. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  4. Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  5. Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough

Archives

  • March 2026
  • February 2026
  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
iosec.in Powered By BlazeThemes.