The OP got the idea from a YouTube post that argues around the MD5.
Here is the simple argument if anyone watches the video.
The speed doesn't imply that a hash function is insecure, the design makes it secure.
Over the years, the researcher find weaknesses in the design of the MD5 and improved over time. Once the MD5 was released, 1992, the attacks set out, and in 2010 Xie and Dengguo Feng announced the first published single-block (512-bit) MD5 collision. Of course, the improvement of the CPU and their cycles are helping the attack faster, however, the main contribution is the attack methodologies. Consider that, the generic collision attack ( birthday attack) requires $2^{64}$ MD5 hashes with a success probability of 1/2. Even today, no ordinary CPU can make $2^{64}$ in a reasonable time. On the other hand, we have now instant collision for MD5, see corkami.
On the other hand, the Blake2 is a very fast hash function, faster than MD5 and SHA-1, and doesn't have the length extension attack since it uses the HAIFA structure, fixes of MD design. It is faster than MD5 and secure at least in a foreseeable feature. Its output size is secure enough for massive parallel attacks or even for Grover's quantum search algorithm. The Blake series now have BLAKE3, it is a parallel hash and very fast.
What important about speed and its relation to security is the digest size. The generic attacks for pre-image attack, secondary pre-image attack, and the generic collision are $2^n$,$2^n$, and $2^{n/2}$, respectively. If you have the 256 or 512-bit output you are fine about the generic attacks. Keep in mind that the short input space is a problem for pre-image attacks and HMAC is adviced.
PS: password hashing ( no collision resistance is required), where we want controllable speed, memory hardness, and thread amount of the password hash function. One should read the canonical question from our venerable site, information security.. Also, Argon2 paper, the 2015 password hashing competition winner, is a good choice to read.
Final note: One should carefully define their problem so that they can achieve a secure design. There is no real security if you don't know your risks.