important source

There are several ways attackers are able to target Web applications (websites that allow you to communicate directly with software via a browser), to steal confidential data, introduce malicious codes, or take over your computer. These attacks exploit weaknesses in components like web apps and content management systems as well as web servers.

Web app attacks account for the majority of security threats. In the past 10 years, attackers have improved their skills at finding and exploiting vulnerabilities that affect application perimeter defences. Attackers can circumvent the common defenses by employing techniques like phishing, botnets and social engineering.

Phishing attacks lure victims into clicking an email that contains malware. This malware is downloaded to the victim’s computer and allows attackers access to computers or devices. Botnets are groups of infected and compromised connected devices, that attackers use to launch DDoS attacks, spread malware, continue fraud through ads, and more.

Directory (or path) traversal attacks leverage patterns of movement to gain access to data on a website, its configuration files as well as databases. To protect yourself from this type of attack requires the proper sanitization of inputs.

SQL injection attacks target databases that stores important website and service data by injecting malicious code, which allows it to override security safeguards and disclose information that normally would not. Attackers can run commands, dump databases and more.

Cross-site scripting attacks (or XSS), insert malicious code on a trusted site to hijack the browsers of users. This allows attackers to steal session cookies as well as confidential information, impersonate users to alter content, and more.