Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Cyber protection for medical clinics in Singapore
Beyond firewalls – addressing cybersecurity blind spots
87% of organizations running software with known, exploitable vulnerab...
Leaked memo reveals AI firm’s research focus on “rogue“ or “scheming” ...
AI has gone from experimentation to default in fraud and AML
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Beyond firewalls – addressing cybersecurity blind spots

      Beyond firewalls – addressing cybersecurity blind spots

      Monday, March 2, 2026, 10:24 AM Asia/Singapore | Features
    • Featured

      Where are financial fraud and AML regulations heading in S E Asia?

      Where are financial fraud and AML regulations heading in S E Asia?

      Tuesday, February 10, 2026, 2:44 PM Asia/Singapore | Features
    • Featured

      How AI is reshaping dating in Asia

      How AI is reshaping dating in Asia

      Monday, February 9, 2026, 5:33 AM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

News

US senator requests FTC probe over software giant’s poor cybersecurity track record

By CybersecAsia editors | Tuesday, September 16, 2025, 1:58 PM Asia/Singapore

US senator requests FTC probe over software giant’s poor cybersecurity track record

Citing key cybersecurity attacks on critical infrastructure, one software giant has been named for necessary investigation for monopoly and negligence.

On 11 September 2025, a US senator urged the Federal Trade Commission (FTC) to investigate Microsoft for what he described as “gross cybersecurity negligence” that had allowed ransomware attacks to severely impact critical US infrastructure, including healthcare networks.

In a four-page letter to FTC Chair, Senator Ron Wyden criticized Microsoft for a cybersecurity culture which, combined with its monopoly over enterprise operating systems, creates a serious national security risk and makes further cyberattacks unavoidable.

Comparing the firm to “an arsonist selling firefighting services to their victims” to underscore his alarm at the situation, the action is linked to a ransomware incident affecting Ascension, a major healthcare system hit last year by an attack that had compromised sensitive personal and medical data of approximately 5.6m people. This assault, attributed to the Black Basta ransomware group, also disrupted electronic health record access and was ranked among the top three largest healthcare-related breaches in 2024 by the US Department of Health and Human Services.

The central risk factor: RC4
The attackers had used a method named Kerberoasting, which targets Microsoft’s Kerberos authentication protocol to extract encrypted service account credentials from Active Directory. Central to this risk is Microsoft’s continued default support for the outdated RC4 encryption algorithm within Kerberos, despite RC4 being known for significant cryptographic weaknesses since the 1980s.

Wyden’s letter has highlighted that RC4 is especially vulnerable because it uses no salt or iterated hash in password encryption, allowing attackers to rapidly guess passwords. The senator criticized Microsoft for failing to enforce strong password policies — such as a minimum 14-character length — for privileged accounts and maintaining RC4 enabled by default, which together expose customers unnecessarily to ransomware and other cybersecurity threats.

Reactions by the firm to help corporate users mitigate risk have been deemed by the US senator as insufficient and too slow. The firm has responded by stating that RC4 is an old standard they discourage and that less than 0.1% of their traffic involves its use. Completely disabling RC4 immediately would break many customer systems, so the firm is pursuing a gradual reduction in RC4 usage with strong warnings to customers, and will ultimately disable it. Starting Q1 2026, any new Active Directory domains using Windows Server 2025 will have RC4 disabled by default, and that additional mitigations for existing deployments are planned to maintain service continuity.

Elephant in the room
This is not the first criticism Microsoft has faced over cybersecurity. In 2024 a report by the US Cyber Safety Review Board had faulted the firm’s preventable mistakes that had allowed Chinese threat group Storm-0558 to access hundreds of Exchange Online mailboxes globally.

Wyden’s office is arguing that despite the firm’s poor cybersecurity record, it continues to secure lucrative government contracts due to the lack of regulatory consequences and its dominant market position.

Cybersecurity experts acknowledge that the security decisions of a dominant platform can have widespread impacts on national infrastructure security, and have highlighted the critical need for improved default security designs.

Ultimately, the senator’s call is for the FTC to recognize how national security is entwined with the default settings of key IT platforms, and he urges enterprises and government entities to demand and adopt more secure-by-design software environments.

Share:

PreviousAdvanced fileless malware targets Philippine military using stealth techniques
Next/DISREGARD RELEASE: Desilo/

Related Posts

Navigating the AI-driven information wars: understanding debunking and prebunking

Navigating the AI-driven information wars: understanding debunking and prebunking

Monday, November 25, 2024

Despite the “crypto winter”, cybercriminals mining Monero are on the rise in Q3

Despite the “crypto winter”, cybercriminals mining Monero are on the rise in Q3

Monday, November 21, 2022

More mishaps in the Google Play Store: the hackers’ playground

More mishaps in the Google Play Store: the hackers’ playground

Tuesday, March 16, 2021

Are SMEs in South-east Asia prone to paying off cyber ransoms?

Are SMEs in South-east Asia prone to paying off cyber ransoms?

Tuesday, August 16, 2022

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • DoveRunner Expands Presence in Southeast Asia with New Office in Jakarta

    Thursday, February 26, 2026
    JAKARTA, Indonesia, Feb. 25, 2026 …Read More »
  • Proofpoint partners with Concentrix to strengthen human- and agent-centric cybersecurity across Asia Pacific

    Tuesday, February 24, 2026
    Partnership integrates Proofpoint’s collaboration and …Read More »
  • Indonesia’s MDI Ventures Doubles Down on Execution and Trust to Unlock Regional Portfolio Value

    Friday, February 20, 2026
    The Telkom-backed VC reinforces cross-sector …Read More »
  • Blackpanda Japan Announces Strategic Partnership with SoftBank to Strengthen Cyber Incident Response in Japan

    Wednesday, February 11, 2026
    SINGAPORE, Feb. 10, 2026 /PRNewswire/ …Read More »
  • Cohesity Collaborates with Google Cloud to Deliver Secure Sandbox Capabilities and Comprehensive Threat Insights Designed to Eliminate Hidden Malware

    Saturday, February 7, 2026
    Embedded Google Threat Intelligence capabilities, …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.