firmware updates

Winsage
February 24, 2026
Microsoft has released a firmware update for the Surface Pro (11th Gen) in February, focusing on enhancing connectivity and device reliability. Key improvements include enhanced security to address vulnerabilities, uninterrupted VPN usage by fixing cellular connectivity issues, consistent cellular settings, improved video conferencing during Microsoft Teams calls, resolved compatibility issues with Surface Dock 2, and a fix for Dolby Vision video playback errors. Additionally, Microsoft is collaborating with Ericsson to enhance 5G connectivity for Surface Pro users, which will include features like automatic eSIM switching and remote policy management. Future 5G bundles will include Microsoft 365, Intune, and Ericsson Enterprise 5G Connect, available with Surface Copilot+ PCs.
AppWizard
February 19, 2026
Researchers from Kaspersky have discovered an Android backdoor named Keenadu, embedded in the firmware of devices, allowing it to infect tablets before they reach consumers. This malware, affecting over 13,700 users globally, primarily targets advertising fraud by hijacking browser search engines, monitoring app installations, and generating fraudulent revenue. Tablets from various manufacturers, including Alldocube, have been found compromised, with the malware likely inserted during the firmware build stage through a compromised supply chain. Keenadu has multiple variants, some hidden in applications, and employs evasion tactics based on device language settings and time zones. It cannot be removed using standard Android security tools, and users are advised to install clean firmware or replace their devices entirely.
Winsage
February 15, 2026
Microsoft will begin rolling out new Secure Boot certificates through Windows Update starting in March 2026, coinciding with the expiration of original certificates from 2011, which will phase out in June 2026. The new certificates include Microsoft Corporation KEK 2K CA 2023, Microsoft UEFI CA 2023, Microsoft Option ROM UEFI CA 2023, and Windows UEFI CA 2023. Not all Windows users will receive the update simultaneously; eligibility will focus on high-confidence devices with strong update histories. Newer PCs sold from 2024 will already have the 2023 Secure Boot certificates, while some devices may require additional firmware updates from their OEMs. PCs that do not receive the new certificates will still boot but will operate with diminished security, increasing vulnerability to exploits and compatibility issues with anti-cheat software and future Windows versions. Users on unsupported Windows versions will not receive the new certificates, leading to heightened security risks after June 2026.
Winsage
February 13, 2026
Microsoft is refreshing Secure Boot certificates across its Windows ecosystem ahead of their expiration in June 2026 to enhance firmware-level security. Most systems will automatically receive the new certificates via Windows Update, while older or specialized devices may require firmware updates from the original equipment manufacturer (OEM). Devices that do not receive the update will still boot but will gradually lose access to critical boot-level mitigations and future compatibility improvements. The deployment of the new certificates has started with regular monthly Windows updates and applies to home users, businesses, and educational institutions. Organizations can manage updates independently using tools like Group Policy. Many devices produced since 2024 and nearly all systems shipped in 2025 already have the updated certificates. If systems are not updated, they will continue to function but will enter a degraded security state, unable to adopt new Secure Boot mitigations. This could increase exposure to threats and lead to compatibility issues with newer operating systems and software. IT administrators should ensure that Windows Update is deploying the latest updates and that device firmware is current, especially for older hardware or specialized systems.
Winsage
February 13, 2026
The foundational security certificates supporting Windows Secure Boot, introduced in 2011, will expire in mid-2026, specifically in June and October. Microsoft and PC manufacturers are updating the Windows ecosystem to address this. Devices that do not receive updated certificates may face security limitations and compatibility issues with newer operating systems and hardware. The transition is described as a "generational refresh" of the trust infrastructure for Windows. Systems failing to update will still function but may enter a "degraded security state," unable to install new security mitigations or newer operating systems. Most users will receive updates automatically through Windows Update, while older systems may require manual intervention. Systems at risk include those running unsupported Windows versions, with Secure Boot disabled, or not enrolled in Extended Security Updates. Users should check their Secure Boot status using PowerShell commands to ensure they are using the new certificates. The update affects not only Windows PCs but also other devices utilizing UEFI Secure Boot.
Winsage
February 11, 2026
Secure Boot is a security feature in Windows and Windows Server that protects devices from untrusted software at startup. It has been in operation since 2011 and relies on certificates embedded in a PC’s firmware. The original Secure Boot certificates will begin to expire in late June 2026. New certificates are being rolled out through regular Windows updates for supported devices, with OEMs preparing new devices with updated certificates since 2024. If devices do not receive the new certificates before the expiration of the old ones, they will continue to function but will enter a degraded security state, limiting future protections. Users generally do not need to take action, as updates will be installed automatically, but some specialized systems may require separate firmware updates. Organizations can monitor the update status through the Windows Security App and should ensure devices are running the latest updates and firmware. Support is available for individuals and organizations facing issues during the update process.
Winsage
February 11, 2026
To address slowdowns and glitches in Windows 11, users should verify several settings before considering a complete reinstallation. Key actions include: 1. Check for Windows Updates: Navigate to Settings > Windows Update to install patches and update device drivers. Uninstall problematic updates if necessary. 2. Manage Startup Applications: Use Task Manager (Ctrl+Shift+Esc) or Settings > Apps > Startup to disable unnecessary auto-starting applications to improve boot speed. 3. Pause OneDrive Syncing: Temporarily pause OneDrive syncing during resource-intensive tasks to prevent performance degradation. 4. Adjust Visual Effects: Disable Transparency effects and Animation effects in Settings > Personalization > Colors and Settings > Accessibility > Visual effects, respectively, to reduce GPU strain. 5. Limit Notifications: Turn off notifications in Settings > System > Notifications to minimize interruptions. 6. Restrict Background Activity: Set background app permissions to "Never" for infrequently used applications to conserve memory and disk usage. 7. Run Security Scans: Use Windows Security to perform a Quick scan and ensure that real-time protection features are enabled to detect malware and adware. 8. Browser Maintenance: Reset browser settings, remove unknown extensions, and enable tracking protection to improve resource management. If issues persist, further steps include running System File Checker, testing memory, checking storage health, or performing a repair install of Windows.
Winsage
January 13, 2026
Microsoft is enhancing security for Windows 11 24H2 and 25H2 users by automatically replacing expiring Secure Boot certificates on eligible devices. Secure Boot protects against malicious software by ensuring only trusted bootloaders are executed during startup. Many Secure Boot certificates are set to expire starting in June 2026, which could jeopardize secure booting capabilities if not updated. The update includes a mechanism to identify devices eligible for automatic receipt of new Secure Boot certificates. IT administrators are advised to install the new certificates to maintain Secure Boot functionality and prevent loss of security updates. Organizations can also deploy Secure Boot certificates through various methods. IT administrators should inventory their devices, verify Secure Boot status, and apply necessary firmware updates before installing Microsoft's certificate updates.
Winsage
January 1, 2026
A modification in the Windows Registry can enable a native NVMe driver, potentially doubling the performance of solid-state drives (SSDs) by enhancing random read and write speeds by up to 80%. This driver is typically reserved for enterprise environments and is not officially available for consumer versions of Windows 11. The modification carries risks, including the possibility of rendering a system unbootable and disrupting features like BitLocker encryption. Early adopters have reported mixed results, with some experiencing significant performance improvements while others face stability issues. The tweak highlights the disparity between consumer and enterprise hardware capabilities and reflects ongoing discussions within the tech community about optimizing SSD performance.
Search