Legacy applications don’t support modern authentication — and cybercriminals know this. …read more

Source:: Threatpost