{"id":"https://openalex.org/W6948374393","doi":"https://doi.org/10.48550/arxiv.2505.13922","title":"The Hidden Dangers of Outdated Software: A Cyber Security Perspective","display_name":"The Hidden Dangers of Outdated Software: A Cyber Security Perspective","publication_year":2025,"publication_date":"2025-05-20","ids":{"openalex":"https://openalex.org/W6948374393","doi":"https://doi.org/10.48550/arxiv.2505.13922"},"language":"en","primary_location":{"id":"doi:10.48550/arxiv.2505.13922","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2505.13922","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2505.13922","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Thiyagarajan, Gogulakrishnan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Thiyagarajan, Gogulakrishnan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Bist, Vinay","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bist, Vinay","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Nayak, Prabhudarshi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nayak, Prabhudarshi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10733","display_name":"Wheat and Barley Genetics and Pathology","score":0.46970000863075256,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T10733","display_name":"Wheat and Barley Genetics and Pathology","score":0.46970000863075256,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11426","display_name":"Genetically Modified Organisms Research","score":0.05649999901652336,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11468","display_name":"Genetic Mapping and Diversity in Plants and Animals","score":0.048900000751018524,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7172999978065491},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5633999705314636},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.552299976348877},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46470001339912415},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4507000148296356},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4278999865055084},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.36010000109672546},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.3562999963760376},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.3472999930381775}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7172999978065491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.705299973487854},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5633999705314636},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.552299976348877},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46470001339912415},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.453000009059906},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4507000148296356},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4278999865055084},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4068000018596649},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.373199999332428},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.36010000109672546},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.3562999963760376},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.3472999930381775},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.34470000863075256},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.33739998936653137},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.32409998774528503},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3131999969482422},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3075999915599823},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3018999993801117},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.29919999837875366},{"id":"https://openalex.org/C57473165","wikidata":"https://www.wikidata.org/wiki/Q7315604","display_name":"Resistance (ecology)","level":2,"score":0.2937000095844269},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.2928999960422516},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2784999907016754},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2567000091075897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2505.13922","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2505.13922","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2505.13922","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2505.13922","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Outdated":[0],"software":[1,57,94,106],"remains":[2],"a":[3,15,61,99,162,183,218],"potent":[4],"and":[5,24,31,77,116,130,151,182,225],"underappreciated":[6],"menace":[7],"in":[8,75,81,180],"2025's":[9],"cybersecurity":[10],"environment,":[11],"exposing":[12],"systems":[13],"to":[14,92,114,133,198],"broad":[16],"array":[17],"of":[18,40,53,84,90,102,105,144,154],"threats,":[19],"including":[20,47,71,128],"ransomware,":[21],"data":[22],"breaches,":[23],"operational":[25],"outages":[26],"that":[27,51,119,207],"can":[28],"have":[29],"devastating":[30],"far-reaching":[32],"impacts.":[33],"This":[34],"essay":[35],"explores":[36],"the":[37,48,72,78,87,103,108,121,140,191,203,209],"unseen":[38],"threats":[39,206],"cyberattacks":[41,54],"by":[42,174],"presenting":[43],"robust":[44],"statistical":[45],"information,":[46],"staggering":[49],"reality":[50],"32%":[52],"exploit":[55],"unpatched":[56],"vulnerabilities,":[58,107],"based":[59],"on":[60,165],"2025":[62],"TechTarget":[63],"survey.":[64],"Furthermore,":[65,123],"it":[66,124,214,216],"discusses":[67],"real":[68],"case":[69],"studies,":[70],"MOVEit":[73],"breach":[74,80],"2023":[76],"Log4Shell":[79],"2021,":[82],"both":[83],"which":[85],"illustrate":[86],"catastrophic":[88],"consequences":[89,153],"failing":[91],"perform":[93],"updates.":[95],"The":[96],"article":[97],"offers":[98],"detailed":[100],"analysis":[101],"nature":[104],"underlying":[109],"reasons":[110],"for":[111,194,222],"user":[112],"resistance":[113],"patches,":[115],"organizational":[117],"barriers":[118],"compound":[120],"issue.":[122],"suggests":[125],"actionable":[126],"solutions,":[127],"automation":[129],"awareness":[131],"campaigns,":[132],"address":[134],"these":[135],"shortcomings.":[136],"Apart":[137],"from":[138],"this,":[139],"paper":[141],"also":[142],"talks":[143],"trends":[145,179],"such":[146,167],"as":[147],"AI-driven":[148],"vulnerability":[149,181],"patching":[150],"legal":[152],"non-compliance":[155],"under":[156],"laws":[157],"like":[158,176],"HIPAA,":[159],"thus":[160],"providing":[161],"futuristic":[163],"outlook":[164],"how":[166],"advancements":[168],"may":[169],"define":[170],"future":[171],"defenses.":[172],"Supplemented":[173],"tables":[175],"one":[177],"detailing":[178],"graph":[184],"illustrating":[185],"technology":[186],"adoption,":[187],"this":[188],"report":[189],"showcases":[190],"pressing":[192],"demand":[193],"anticipatory":[195],"update":[196],"strategies":[197],"safeguard":[199],"digital":[200],"ecosystems":[201],"against":[202],"constantly":[204],"evolving":[205],"characterize":[208],"modern":[210],"cyber":[211],"landscape.":[212],"As":[213],"stands,":[215],"is":[217],"very":[219],"useful":[220],"document":[221],"practitioners,":[223],"policymakers,":[224],"researchers.":[226]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
