Attackers can take advantage of a decades-old protocol to exploit 5G networks. Researchers at Black Hat Asia have shown how hackers can use an exploit in 5G networks because of the platform’s reliance on an old protocol from 1975.