Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft to Update Windows Secure Boot in 2026

Microsoft to Update Windows Secure Boot in 2026

Posted on February 11, 2026 By CWS

Microsoft has announced plans to refresh its Secure Boot certificates for Windows systems starting in June 2026. This update is necessary as the existing certificates are approaching the end of their lifecycle.

Understanding Secure Boot’s Role

Introduced in 2011, Secure Boot has been a cornerstone of Microsoft’s security architecture, ensuring that only verified software runs from the moment a device is powered on. This protection is facilitated by digital certificates embedded in a device’s firmware. However, after more than 15 years of service, the current certificates will reach their expiration date in June.

Implementation of New Certificates

In line with best practices, Microsoft plans to phase out the old certificates and introduce new ones across all supported Windows versions through automatic updates. To facilitate this transition, the company has collaborated with firmware manufacturers to enhance update tools and capabilities, ensuring a smooth rollout.

According to Microsoft, devices released since 2024, and nearly all models shipped in 2025, already include the updated certificates, minimizing the need for user intervention. For most users and businesses utilizing automatic updates, the new certificates will be seamlessly integrated via the standard Windows update process.

Special Cases and Recommendations

Some specialized systems, such as certain servers or IoT devices, may require a distinct update approach. In some cases, a firmware update from the device manufacturer will be necessary before the new Secure Boot certificates can be applied through Windows Update. Microsoft advises users to check OEM support pages to confirm that their devices have the latest firmware updates.

Devices that do not receive the updated certificates by the expiration date will continue to function but may lack future boot-level security measures. As new vulnerabilities emerge, these systems could become more vulnerable due to an inability to implement new protections. This may also lead to compatibility issues with newer software and hardware.

Preparation and Future Outlook

Systems running on Windows 10 and older versions are not eligible for the new certificates unless enrolled in the Extended Security Updates program. Organizations are encouraged to review their systems as part of deployment strategies, validate update readiness, and use certificate monitoring tools. Ensuring devices are updated with the latest Windows updates and firmware is crucial.

Microsoft emphasizes a phased approach to the rollout, coordinated with ecosystem partners and informed by extensive testing. Despite these measures, a small number of devices may still require additional support during the update process, due to the diversity of models and usage scenarios.

The upcoming update is a critical step in maintaining robust cybersecurity measures, and Microsoft urges all users to prepare accordingly.

Security Week News Tags:automated updates, certificate renewal, Cybersecurity, Firmware, Microsoft, OEM, operating systems, Secure Boot, security update, Windows

Post navigation

Previous Post: Critical SandboxJS Flaw Raises Security Concerns
Next Post: Cybercriminals Exploit AI to Distribute macOS Malware

Related Posts

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet Security Week News
Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps Security Week News
North Korean Hackers Target macOS Developers via Malicious VS Code Projects North Korean Hackers Target macOS Developers via Malicious VS Code Projects Security Week News
ThreatSpike Raises  Million in Series A Funding ThreatSpike Raises $14 Million in Series A Funding Security Week News
Endpoint Security Firm Remedio Raises  Million in First Funding Round Endpoint Security Firm Remedio Raises $65 Million in First Funding Round Security Week News
Managing Technical Debt in AI-Driven Software Development Managing Technical Debt in AI-Driven Software Development Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News