• Brute Force Attacks - entering different username and password combinations until gaining entry.

  • Cross-Site Scripting - hackers entice victims to a site that contains malicious JavaScript codes.

  • File Inclusions - exploitation of vulnerabilities in the WordPress PHP code.

  • Malware - code injected into the site to facilitate, for example, unauthorized redirects or allow high-level access to your hosting account.

  • SQL Injections - attackers look for unsecured databases and access them using MySQL injections, which gives them control over all the data and enables them to create admin accounts or insert content into the database such as links to other sites that contain malware.