Legacy applications don't support modern authentication -- and cybercriminals know this. Via Vulnerabilities – Threatpost https://threatpost.com