Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft to Update Windows Secure Boot in 2026

Microsoft to Update Windows Secure Boot in 2026

Posted on February 11, 2026 By CWS

Microsoft has announced plans to refresh its Secure Boot certificates for Windows systems starting in June 2026. This update is necessary as the existing certificates are approaching the end of their lifecycle.

Understanding Secure Boot’s Role

Introduced in 2011, Secure Boot has been a cornerstone of Microsoft’s security architecture, ensuring that only verified software runs from the moment a device is powered on. This protection is facilitated by digital certificates embedded in a device’s firmware. However, after more than 15 years of service, the current certificates will reach their expiration date in June.

Implementation of New Certificates

In line with best practices, Microsoft plans to phase out the old certificates and introduce new ones across all supported Windows versions through automatic updates. To facilitate this transition, the company has collaborated with firmware manufacturers to enhance update tools and capabilities, ensuring a smooth rollout.

According to Microsoft, devices released since 2024, and nearly all models shipped in 2025, already include the updated certificates, minimizing the need for user intervention. For most users and businesses utilizing automatic updates, the new certificates will be seamlessly integrated via the standard Windows update process.

Special Cases and Recommendations

Some specialized systems, such as certain servers or IoT devices, may require a distinct update approach. In some cases, a firmware update from the device manufacturer will be necessary before the new Secure Boot certificates can be applied through Windows Update. Microsoft advises users to check OEM support pages to confirm that their devices have the latest firmware updates.

Devices that do not receive the updated certificates by the expiration date will continue to function but may lack future boot-level security measures. As new vulnerabilities emerge, these systems could become more vulnerable due to an inability to implement new protections. This may also lead to compatibility issues with newer software and hardware.

Preparation and Future Outlook

Systems running on Windows 10 and older versions are not eligible for the new certificates unless enrolled in the Extended Security Updates program. Organizations are encouraged to review their systems as part of deployment strategies, validate update readiness, and use certificate monitoring tools. Ensuring devices are updated with the latest Windows updates and firmware is crucial.

Microsoft emphasizes a phased approach to the rollout, coordinated with ecosystem partners and informed by extensive testing. Despite these measures, a small number of devices may still require additional support during the update process, due to the diversity of models and usage scenarios.

The upcoming update is a critical step in maintaining robust cybersecurity measures, and Microsoft urges all users to prepare accordingly.

Security Week News Tags:automated updates, certificate renewal, Cybersecurity, Firmware, Microsoft, OEM, operating systems, Secure Boot, security update, Windows

Post navigation

Previous Post: Critical SandboxJS Flaw Raises Security Concerns
Next Post: Cybercriminals Exploit AI to Distribute macOS Malware

Related Posts

Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices Security Week News
Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign Security Week News
Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers Security Week News
Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets Security Week News
Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking Security Week News
US Insurance Industry Warned of Scattered Spider Attacks US Insurance Industry Warned of Scattered Spider Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager
  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager
  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark