Cato CTRL Threat Research: Stuck in the Past- How Hackers Exploit Years-Old CVEs for Cryptojacking
Cybercriminals often exploit outdated vulnerabilities – quite literally. While organizations focus on addressing the latest zero-day threats, attackers continue to profit by targeting weaknesses that should have been resolved long ago. Some of these Common Vulnerability and Exposures (CVEs) date back nearly a decade, yet they remain heavily exploited. This trend proves that old flaws never truly disappear.