How Threat Actors can Hack your Applications