Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Tackling next year’s enterprise cyber resilience trends: five strategi...
Web browsers that rank lowest for privacy protection
The impact of APAC’s AI buildout on cybersecurity in 2026
The quantum future is coming – and hackers are already preparing for i...
Autocrypt Announces Product Release of Post-Quantum PKI Product, Pione...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Web browsers that rank lowest for privacy protection

      Web browsers that rank lowest for privacy protection

      Wednesday, December 10, 2025, 8:30 AM Asia/Singapore | Features, Newsletter
    • Featured

      The impact of APAC’s AI buildout on cybersecurity in 2026

      The impact of APAC’s AI buildout on cybersecurity in 2026

      Tuesday, December 9, 2025, 2:57 PM Asia/Singapore | Features
    • Featured

      Is your AI secretly sabotaging your organization?

      Is your AI secretly sabotaging your organization?

      Monday, December 1, 2025, 4:25 PM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

News

US senator requests FTC probe over software giant’s poor cybersecurity track record

By CybersecAsia editors | Tuesday, September 16, 2025, 1:58 PM Asia/Singapore

US senator requests FTC probe over software giant’s poor cybersecurity track record

Citing key cybersecurity attacks on critical infrastructure, one software giant has been named for necessary investigation for monopoly and negligence.

On 11 September 2025, a US senator urged the Federal Trade Commission (FTC) to investigate Microsoft for what he described as “gross cybersecurity negligence” that had allowed ransomware attacks to severely impact critical US infrastructure, including healthcare networks.

In a four-page letter to FTC Chair, Senator Ron Wyden criticized Microsoft for a cybersecurity culture which, combined with its monopoly over enterprise operating systems, creates a serious national security risk and makes further cyberattacks unavoidable.

Comparing the firm to “an arsonist selling firefighting services to their victims” to underscore his alarm at the situation, the action is linked to a ransomware incident affecting Ascension, a major healthcare system hit last year by an attack that had compromised sensitive personal and medical data of approximately 5.6m people. This assault, attributed to the Black Basta ransomware group, also disrupted electronic health record access and was ranked among the top three largest healthcare-related breaches in 2024 by the US Department of Health and Human Services.

The central risk factor: RC4
The attackers had used a method named Kerberoasting, which targets Microsoft’s Kerberos authentication protocol to extract encrypted service account credentials from Active Directory. Central to this risk is Microsoft’s continued default support for the outdated RC4 encryption algorithm within Kerberos, despite RC4 being known for significant cryptographic weaknesses since the 1980s.

Wyden’s letter has highlighted that RC4 is especially vulnerable because it uses no salt or iterated hash in password encryption, allowing attackers to rapidly guess passwords. The senator criticized Microsoft for failing to enforce strong password policies — such as a minimum 14-character length — for privileged accounts and maintaining RC4 enabled by default, which together expose customers unnecessarily to ransomware and other cybersecurity threats.

Reactions by the firm to help corporate users mitigate risk have been deemed by the US senator as insufficient and too slow. The firm has responded by stating that RC4 is an old standard they discourage and that less than 0.1% of their traffic involves its use. Completely disabling RC4 immediately would break many customer systems, so the firm is pursuing a gradual reduction in RC4 usage with strong warnings to customers, and will ultimately disable it. Starting Q1 2026, any new Active Directory domains using Windows Server 2025 will have RC4 disabled by default, and that additional mitigations for existing deployments are planned to maintain service continuity.

Elephant in the room
This is not the first criticism Microsoft has faced over cybersecurity. In 2024 a report by the US Cyber Safety Review Board had faulted the firm’s preventable mistakes that had allowed Chinese threat group Storm-0558 to access hundreds of Exchange Online mailboxes globally.

Wyden’s office is arguing that despite the firm’s poor cybersecurity record, it continues to secure lucrative government contracts due to the lack of regulatory consequences and its dominant market position.

Cybersecurity experts acknowledge that the security decisions of a dominant platform can have widespread impacts on national infrastructure security, and have highlighted the critical need for improved default security designs.

Ultimately, the senator’s call is for the FTC to recognize how national security is entwined with the default settings of key IT platforms, and he urges enterprises and government entities to demand and adopt more secure-by-design software environments.

Share:

PreviousAdvanced fileless malware targets Philippine military using stealth techniques
Next/DISREGARD RELEASE: Desilo/

Related Posts

Why does password authentication remain dominant?

Why does password authentication remain dominant?

Thursday, October 19, 2023

Another Singapore company suffers data breach linked to a third-party vendor

Another Singapore company suffers data breach linked to a third-party vendor

Monday, January 10, 2022

Maze ransomware strikes tech giant Canon

Maze ransomware strikes tech giant Canon

Tuesday, August 11, 2020

Time to retrace rushed WFH networking provisions and tidy up the mess!

Time to retrace rushed WFH networking provisions and tidy up the mess!

Tuesday, August 11, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keeps members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keeps members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more
  • Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    An improved dual-liveness biometric framework can counter more deepfake threats, ensure compliance, and protect underbanked …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.