When a bad actor attempts to get valuable information from your website by exploiting vulnerabilities in the sites databases.
It is the type of attack that takes advantage of improper coding of a web application and allows a hacker to inject SQL commands into, for example, a login form to allow them to gain access to the data held within the database.
Comments