Skip to content
Company logo

Cyber Security

  • Home
  • Services
  • Blog
  • Cookie Policy (EU)
  • Terms and Conditions
  • Contact
  • Free Consultation
    Free Consultation

August 2020

Security Threats to Financial Web Applications

Financial Apps, Web Application Security / Reha Esen

Logic errors in financial web applications pose a more significant threat than APTs. This post lays down a structured approach to categorize and understand the types of logic errors in financial apps.

Security Threats to Financial Web Applications Read More »

Fantastic Vulnerabilities and Where to Find Them

Web Application Security / Reha Esen

Interesting web and mobile application vulnerabilities

Fantastic Vulnerabilities and Where to Find Them Read More »

Recent Posts

  • Planning Your First PenTest
  • Why is Security Testing Vital for Healthcare Applications?
  • The Benefits of Web Application Penetration Testing
  • Understanding the Difference Between Vulnerability Scans and Penetration Tests
  • What is a Penetration Test? Unveiling the Secrets of Cybersecurity Assessments

Recent Comments

    Archives

    • June 2023
    • May 2023
    • August 2020
    • June 2020
    • February 2020

    Categories

    • Financial Apps
    • General Security
    • Scoping and methodology
    • Web Application Security

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Harju County, Tallinn, Sepapaja 6, 15551 ESTONIA | https://calendly.com/sistematik | Email: sales@sistematik.eu
    Copyright © 2025 Sistematik O.Ü.
    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}