Legacy Systems
Cybersecurity statistics about legacy systems
Related Topics
Showing 1-3 of 3 results
75% of CISOs report their enterprises rely on extending controls originally designed for other attack surfaces to cover AI-driven workflows and infrastructure.
Pentera•2/22/2026•
AI SecurityUS
1 in 14 files, initially deemed 'safe' by legacy systems, were proven to be malicious
OPSWAT•8/6/2025•
MalwareLegacy systems
18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems.
Wallarm•1/1/2025•
APIExploits