Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft to Update Windows Secure Boot in 2026

Microsoft to Update Windows Secure Boot in 2026

Posted on February 11, 2026 By CWS

Microsoft has announced plans to refresh its Secure Boot certificates for Windows systems starting in June 2026. This update is necessary as the existing certificates are approaching the end of their lifecycle.

Understanding Secure Boot’s Role

Introduced in 2011, Secure Boot has been a cornerstone of Microsoft’s security architecture, ensuring that only verified software runs from the moment a device is powered on. This protection is facilitated by digital certificates embedded in a device’s firmware. However, after more than 15 years of service, the current certificates will reach their expiration date in June.

Implementation of New Certificates

In line with best practices, Microsoft plans to phase out the old certificates and introduce new ones across all supported Windows versions through automatic updates. To facilitate this transition, the company has collaborated with firmware manufacturers to enhance update tools and capabilities, ensuring a smooth rollout.

According to Microsoft, devices released since 2024, and nearly all models shipped in 2025, already include the updated certificates, minimizing the need for user intervention. For most users and businesses utilizing automatic updates, the new certificates will be seamlessly integrated via the standard Windows update process.

Special Cases and Recommendations

Some specialized systems, such as certain servers or IoT devices, may require a distinct update approach. In some cases, a firmware update from the device manufacturer will be necessary before the new Secure Boot certificates can be applied through Windows Update. Microsoft advises users to check OEM support pages to confirm that their devices have the latest firmware updates.

Devices that do not receive the updated certificates by the expiration date will continue to function but may lack future boot-level security measures. As new vulnerabilities emerge, these systems could become more vulnerable due to an inability to implement new protections. This may also lead to compatibility issues with newer software and hardware.

Preparation and Future Outlook

Systems running on Windows 10 and older versions are not eligible for the new certificates unless enrolled in the Extended Security Updates program. Organizations are encouraged to review their systems as part of deployment strategies, validate update readiness, and use certificate monitoring tools. Ensuring devices are updated with the latest Windows updates and firmware is crucial.

Microsoft emphasizes a phased approach to the rollout, coordinated with ecosystem partners and informed by extensive testing. Despite these measures, a small number of devices may still require additional support during the update process, due to the diversity of models and usage scenarios.

The upcoming update is a critical step in maintaining robust cybersecurity measures, and Microsoft urges all users to prepare accordingly.

Security Week News Tags:automated updates, certificate renewal, Cybersecurity, Firmware, Microsoft, OEM, operating systems, Secure Boot, security update, Windows

Post navigation

Previous Post: Critical SandboxJS Flaw Raises Security Concerns
Next Post: Cybercriminals Exploit AI to Distribute macOS Malware

Related Posts

Vulnerabilities Patched by Juniper, VMware and Zoom  Vulnerabilities Patched by Juniper, VMware and Zoom  Security Week News
Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying  Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying  Security Week News
Data Breach Affects 1 Million Members at Europe’s Top Gym Data Breach Affects 1 Million Members at Europe’s Top Gym Security Week News
New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data Security Week News
Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones Security Week News
Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark