{"id":82967,"date":"2025-04-16T04:36:33","date_gmt":"2025-04-16T04:36:33","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82967"},"modified":"2025-04-21T11:52:57","modified_gmt":"2025-04-21T11:52:57","slug":"hacking-payment-services-real-world-business-logic-attack-scenarios","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/","title":{"rendered":"Hacking Payment Services: Real-World Business Logic Attack Scenarios\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82967\" class=\"elementor elementor-82967\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e503ba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9e503ba\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39f324e\" data-id=\"39f324e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff08deb elementor-widget elementor-widget-text-editor\" data-id=\"ff08deb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong> April 15, 2025<br>\n<strong>Time:<\/strong> 4:30 PM EEST | 9:30 AM EDT | 7:00 PM IST<br>\n<strong>Topic:<\/strong> Hacking Payment Services: Real-World Business Logic Attack Scenarios<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong style=\"word-spacing: normal;\">Abstract:&nbsp;<\/strong><span style=\"word-spacing: normal;\">This webinar offers an in-depth exploration of real-world business logic attacks that impact the banking and fintech sectors. It examines how legitimate functions can be exploited to perform malicious attacks that lead to financial losses for institutions. By understanding these threats, participants will gain insight into the evolving tactics used by attackers targeting modern financial services. The webinar will first examine how various techniques can compromise modern payment services by ethically attacking every step in the payment flow of financial services. This includes the entire process from customer registration and login through the eKYC process to various payment services, including real-time payments, banking services (such as credit card issuance and replacement), and BNPL (Buy Now, Pay Later) services.<\/span><\/p>\n<p>Real-world attack scenarios will be uncovered, including bypassing AI-based eKYC verification techniques, taking over accounts, executing real-time payments without deducting funds from the sender&#8217;s account, obtaining paid banking services for free, breaking BNPL limits, and much more. In addition to exposing these tactics, the webinar will also address the financial impact of these attacks on businesses. It will provide insights into how these attacks are executed and discuss effective strategies to mitigate these vulnerabilities.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding business logic attacks: Explore how legitimate functions in registration, eKYC, and payment workflows can be exploited for malicious purposes.<\/li>\n<li>Comprehensive attack scenarios: Understand real-world attack techniques, including AI-based eKYC verification bypass, account takeover, fraudulent real-time payments, and BNPL manipulation.<\/li>\n<li>Financial impact of attacks: Learn about the significant financial risks these attacks pose to banking institutions.<\/li>\n<li>Mitigation strategies: Discover effective, actionable methods to identify and defend against business logic vulnerabilities in modern payment systems.<\/li>\n<li>Security best practices: Know how to secure payment services with cybersecurity best practices to minimize risks.<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/image-6.jpg\" alt=\"Heba Farahat\" width=\"192\" height=\"256\"><strong>Heba Farahat<\/strong>,Sr. Cybersecurity Consultant at Liquid C2 MENA<\/p>\n<p><strong>Bio:<\/strong> Heba works as a senior cybersecurity consultant, empowering, supporting, and consulting for the largest companies in the Middle East across various sectors, including banking, telecom, insurance, tourism, and fintech. She holds many advanced certifications, including CISSP, CRTE, CRTP, OSCP, eWPT, and CEH. Besides her work, Heba is actively involved in mentorship programs, where she delivers talks and training to diverse audiences at local, regional, and international conferences, as well as in schools, universities, and corporations to spread knowledge and awareness about cybersecurity.<\/p>\n<p><strong>Awards and Acknowledgments: <\/strong><\/p>\n<ul>\n<li>Top 20 Women of the World in Cybersecurity Edition 2024<\/li>\n<li>Two zero-days in SD-WAN Cisco products: CVE-2023-20261 and CVE-2023-20254<\/li>\n<li>Women Ethical Hacker of the Year Award 2022<\/li>\n<li>Rising Star Middle East Award 2020<\/li>\n<li>Top 50 Women in Cybersecurity in Africa Award 2020<\/li>\n<li>IFSEC Global Security Influencer Award 2019<\/li>\n<\/ul>\n<p><a name=\"attend\"><\/a><\/p>\n\n<div id=\"attend\"><\/div>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/1Gndza8prMw?si=lyelY4M1BWAKHC0I\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 15, 2025 Time: 4:30 PM EEST | 9:30 AM EDT | 7:00 PM IST Topic: Hacking Payment Services: Real-World Business Logic Attack Scenarios Watch Now Abstract:&nbsp;This webinar offers an in-depth exploration of real-world business logic attacks that impact the banking and fintech sectors. It examines how legitimate functions can be exploited to perform&hellip;<\/p>\n","protected":false},"author":32,"featured_media":82968,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82967","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Business Logic Attack Scenarios: Ethical Hacking for Financial Cybersecurity<\/title>\n<meta name=\"description\" content=\"Explore how business logic attacks exploit banking payment services. Learn financial services (FinServ) cybersecurity through ethical hacking of the entire payment flow.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Payment Services: Real-World Business Logic Attack Scenarios\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore how business logic attacks exploit banking payment services. Learn financial services (FinServ) cybersecurity through ethical hacking of the entire payment flow.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-16T04:36:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-21T11:52:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/15-april_465x310-03.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Hacking Payment Services: Real-World Business Logic Attack Scenarios\u00a0\",\"datePublished\":\"2025-04-16T04:36:33+00:00\",\"dateModified\":\"2025-04-21T11:52:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/\"},\"wordCount\":454,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/15-april_465x310-03.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/\",\"name\":\"Business Logic Attack Scenarios: Ethical Hacking for Financial Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/15-april_465x310-03.jpg\",\"datePublished\":\"2025-04-16T04:36:33+00:00\",\"dateModified\":\"2025-04-21T11:52:57+00:00\",\"description\":\"Explore how business logic attacks exploit banking payment services. Learn financial services (FinServ) cybersecurity through ethical hacking of the entire payment flow.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/15-april_465x310-03.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/15-april_465x310-03.jpg\",\"width\":969,\"height\":646,\"caption\":\"Business logic attack scenarios in banking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/hacking-payment-services-real-world-business-logic-attack-scenarios\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hacking Payment Services: Real-World Business Logic Attack Scenarios\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Business Logic Attack Scenarios: Ethical Hacking for Financial Cybersecurity","description":"Explore how business logic attacks exploit banking payment services. Learn financial services (FinServ) cybersecurity through ethical hacking of the entire payment flow.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Payment Services: Real-World Business Logic Attack Scenarios\u00a0","og_description":"Explore how business logic attacks exploit banking payment services. Learn financial services (FinServ) cybersecurity through ethical hacking of the entire payment flow.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-04-16T04:36:33+00:00","article_modified_time":"2025-04-21T11:52:57+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/15-april_465x310-03.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Hacking Payment Services: Real-World Business Logic Attack Scenarios\u00a0","datePublished":"2025-04-16T04:36:33+00:00","dateModified":"2025-04-21T11:52:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/"},"wordCount":454,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/15-april_465x310-03.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/","name":"Business Logic Attack Scenarios: Ethical Hacking for Financial Cybersecurity","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/15-april_465x310-03.jpg","datePublished":"2025-04-16T04:36:33+00:00","dateModified":"2025-04-21T11:52:57+00:00","description":"Explore how business logic attacks exploit banking payment services. Learn financial services (FinServ) cybersecurity through ethical hacking of the entire payment flow.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/15-april_465x310-03.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/15-april_465x310-03.jpg","width":969,"height":646,"caption":"Business logic attack scenarios in banking"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/hacking-payment-services-real-world-business-logic-attack-scenarios\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Hacking Payment Services: Real-World Business Logic Attack Scenarios\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82967"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82967\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82968"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}