{"id":727,"date":"2021-07-06T03:13:38","date_gmt":"2021-07-06T03:13:38","guid":{"rendered":"http:\/\/www.cyberlaws.org\/?page_id=727"},"modified":"2021-07-15T04:00:25","modified_gmt":"2021-07-15T04:00:25","slug":"bug-bounty-programs-for-fintech","status":"publish","type":"page","link":"https:\/\/www.cyberlaws.org\/bug-bounty-programs\/bug-bounty-programs-for-fintech\/","title":{"rendered":"Bug Bounty Programs For Fintech"},"content":{"rendered":"

List of bug Bounty Program for Fintech<\/h1>\n

 <\/p>\n

DX BANK<\/p>\n

https:\/\/www.dzbank.de\/content\/dzbank_com\/en\/home\/service\/bug-bounty-program.html<\/a><\/p>\n

PAYTM<\/p>\n

https:\/\/bugbounty.paytm.com\/<\/a><\/p>\n

ZERODHA<\/p>\n

https:\/\/zerodha.com\/bug-bounty\/<\/a><\/p>\n

UPSTOX<\/p>\n

https:\/\/upstox.com\/bug-bounty\/<\/a><\/p>\n

N26<\/p>\n

https:\/\/n26.com\/en-eu\/bug-bounty-program<\/a><\/p>\n

TBI BANK<\/p>\n

https:\/\/tbibank.ro\/en\/about-tbi-group\/Bug-Bounty-Program<\/a><\/p>\n

 <\/p>\n

More Links Coming Soon \u2026<\/p>\n

If you wish to share information, which should be a part of this Page, Please email us at:\u00a0team@cyberlaws.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

List of bug Bounty Program for Fintech   DX BANK https:\/\/www.dzbank.de\/content\/dzbank_com\/en\/home\/service\/bug-bounty-program.html PAYTM https:\/\/bugbounty.paytm.com\/ ZERODHA https:\/\/zerodha.com\/bug-bounty\/ UPSTOX https:\/\/upstox.com\/bug-bounty\/ N26 https:\/\/n26.com\/en-eu\/bug-bounty-program TBI BANK https:\/\/tbibank.ro\/en\/about-tbi-group\/Bug-Bounty-Program   More Links Coming Soon… <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":216,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages\/727"}],"collection":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/comments?post=727"}],"version-history":[{"count":10,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages\/727\/revisions"}],"predecessor-version":[{"id":745,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages\/727\/revisions\/745"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages\/216"}],"wp:attachment":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/media?parent=727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}