Legacy applications don’t support modern authentication — and cybercriminals know this.
Source: Threadpost