Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026

    New Test-Time Training Lets Models Keep Learning Without Costs Exploding

    January 14, 2026

    UK, Australia, Canada Clash With Elon Musk Over AI Safety, Truss Pushes Back

    January 13, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    Facebook X (Twitter) Instagram Pinterest VKontakte
    TallwireTallwire
    • Tech

      New Test-Time Training Lets Models Keep Learning Without Costs Exploding

      January 14, 2026

      Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

      January 14, 2026

      Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

      January 13, 2026

      Researchers Push Boundaries on AI That Actually Keeps Learning After Training

      January 13, 2026

      UK, Australia, Canada Clash With Elon Musk Over AI Safety, Truss Pushes Back

      January 13, 2026
    • AI News
    TallwireTallwire
    Home»Tech»Senator Pushes FTC to Investigate Microsoft for ‘Gross Cybersecurity Negligence’
    Tech

    Senator Pushes FTC to Investigate Microsoft for ‘Gross Cybersecurity Negligence’

    Updated:December 25, 20254 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Senator Pushes FTC to Investigate Microsoft for 'Gross Cybersecurity Negligence'
    Senator Pushes FTC to Investigate Microsoft for 'Gross Cybersecurity Negligence'
    Share
    Facebook Twitter LinkedIn Pinterest Email

    U.S. Senator Ron Wyden (D-Ore.) has formally requested the Federal Trade Commission (FTC) open an investigation into Microsoft, arguing that the tech giant’s cyber-security practices amount to “gross negligence” and pose a serious national security risk. In a September 10, 2025 letter to FTC Chair Andrew Ferguson, Wyden accuses Microsoft of delivering “dangerous, insecure software” to the U.S. government and critical infrastructure sectors, especially healthcare. Central to his concerns are default insecure settings in Windows, continued support for the outdated RC4 encryption standard, and failure to require long enough passwords for privileged accounts—factors which he alleges enabled the 2024 ransomware attack on Ascension Healthcare, affecting 5.6 million patients. Wyden also criticizes Microsoft for not promptly disabling RC4, for providing guidance in overly technical language to a small audience rather than broadly warning its users, and for profiting from cybersecurity add-ons while its core software remains vulnerable. Microsoft has responded that RC4 usage is minimal (under 0.1% of traffic), that disabling it completely risks compatibility breaks, and that it plans to disable RC4 by default in certain Windows Server 2025 installations in early 2026; meanwhile mitigation for existing systems will be added. 

    Sources: Office of US Sen. Ron Wyden, IT Pro, CyberScoop

    Key Takeaways

    – Outdated defaults matter: Microsoft’s default configurations, including support for the RC4 encryption protocol and insufficiently strong password policies for privileged accounts, are central to Senator Wyden’s argument that the company’s product security posture is leaving critical infrastructure vulnerable.

    – Real-world consequences: The 2024 ransomware incident at Ascension Healthcare is cited as a concrete example illustrating how weak defaults, combined with phishing via Microsoft’s services (Bing/Edge), allowed attackers to gain privileged access and compromise patient data.

    – Regulatory scrutiny and response timeline: Wyden is pushing the FTC to hold Microsoft accountable; Microsoft has committed to disabling RC4 by default in certain new server setups by early 2026, but critics argue the pace and communication have been too slow and that broader mitigation is still needed.

    In-Depth

    Senator Ron Wyden has escalated his criticism of Microsoft, demanding that the Federal Trade Commission (FTC) investigate what he describes as “gross cybersecurity negligence.” His September 2025 letter argues that Microsoft’s long-standing default settings, engineering choices, and slow movement away from obsolete encryption standards have created exploitable gaps in critical infrastructure defenses—primarily in healthcare—but also affecting government systems broadly.

    According to Wyden, Microsoft’s software design, especially its defaults and support for antiquated protocols like RC4, have enabled serious threats, including the 2024 ransomware breach at Ascension Healthcare, which resulted in the exposure of sensitive data for 5.6 million patients after a contractor unintentionally introduced malware via a malicious Bing search link.

    The senator’s central contention is that Microsoft, by not making more secure configurations the default, shifts the burden of security onto customers—many of whom lack the technical bandwidth to audit, change, or maintain hardened settings. Wyden argues this dynamic is especially problematic given Microsoft’s de facto dominance in enterprise operating systems and identity management tools like Active Directory.

    In his view, when one entity controls so much of the architecture, its choices about defaults, encryption, and backwards compatibility ripple outward, influencing systemic risk. To this point, Wyden highlights Kerberoasting—an attack that abuses weak or legacy encryption in Kerberos ticketing systems—together with weak password requirements, as vectors that remain open because Microsoft hasn’t required usage of stronger encryption (e.g. AES) or eliminated RC4 broadly and more rapidly.

    Microsoft, in turn, defends its position by noting that RC4 is rarely used in practice (under 0.1% of traffic), that removing or disabling it entirely risks breaking compatibility with existing systems, and that the company has placed on its roadmap the phasing out of RC4 and other mitigations. It also points out that, technically, organizations can choose stronger settings—it’s just not the default. Nonetheless, Wyden contends that merely offering the possibility of stronger security, without making it standard, is insufficient given real consequences of weak settings: compromised networks, stolen data, and disruption of public health services.

    As this debate unfolds, the questions are not simply whether Microsoft’s engineering roadmap is improving, but whether regulatory bodies like the FTC should intervene to shift incentives, enforce more secure defaults, and hold dominant platform providers to greater responsibility for the downstream risks of their software engineer­ing decisions.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSen. Klobuchar Pushes Tougher Deepfake Rules — Federal Law Follows
    Next Article Senior Developers Now Spending Most of Their Time Babysitting AI Code

    Related Posts

    New Test-Time Training Lets Models Keep Learning Without Costs Exploding

    January 14, 2026

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026

    Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

    January 13, 2026

    Researchers Push Boundaries on AI That Actually Keeps Learning After Training

    January 13, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    New Test-Time Training Lets Models Keep Learning Without Costs Exploding

    January 14, 2026

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026

    Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

    January 13, 2026

    Researchers Push Boundaries on AI That Actually Keeps Learning After Training

    January 13, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) Instagram Pinterest YouTube
    • Tech
    • AI News
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.