Database Security 101: How Attackers Get In, How to Keep Them Out
Despite maybe a decade of dealing with these problems, SQL injection and brute force or credential theft attacks remain among the most potent methods used by attackers seeking to compromise