. . . "The most common types of attacks are SQL injections or attempts to insert files with malicious code, which they can do through a vulnerable url of a plug in or component, especially if that particular component or extension has not been updated it for a while." . .