Handler on Duty: Johannes Ullrich
Threat Level: green
Podcast Detail
SANS Stormcast Wednesday, February 11th, 2026: Microsoft Patch Tuesday; Secure Boot Updates; Fake 7-Zip; FortiSlob
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9804.mp3
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Microsoft Patch Tuesday - February 2026
https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20-%20February%202026/32700
Refreshing the root of trust
https://blogs.windows.com/windowsexperience/2026/02/10/refreshing-the-root-of-trust-industry-collaboration-on-secure-boot-certificate-updates/
Fake 7-Zip downloads are turning home PCs into proxy nodes
https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-7-zip-downloads-are-turning-home-pcs-into-proxy-nodes
FortiNet Vulnerabilities
https://fortiguard.fortinet.com/psirt/FG-IR-25-093 https://fortiguard.fortinet.com/psirt/FG-IR-25-1052
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Wednesday, February 11th, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Cybersecurity Engineering. Well, of course, top of the news today, Microsoft's Patch Tuesday and the number of patches was actually not that bad. We got patches for 59 different Microsoft vulnerabilities. There were patches released earlier this month for Microsoft Edge. Those are the Chromium browser vulnerabilities that were sort of ported over to Microsoft Edge. But the big story is really that we have six vulnerabilities that are being addressed that were already exploited before today. And three of these vulnerabilities have been somewhat publicly known already. So those are, of course, those three are the ones that you need to pay most attention to. And a little bit lucky, I guess, these are actually three similar and related vulnerabilities. You may be familiar in Windows with technologies like smart screen and such, where if you're downloading some binary or some script and then you double click it, well, you'll get a warning that you're about to execute code that you downloaded from the internet. And these vulnerabilities allow to bypass exactly sort of these type of warnings. Now, it affects three different subsystems here, which is why we have three different vulnerabilities. One is Windows Shell, one is Microsoft Word, and then we also have a patch for MSHTML. That's the good old Internet Explorer HTML rendering engine. Of course, it has long been replaced with Microsoft Edge, which has its own rendering engine. But a lot of sort of other software still uses MSHTML, and that's why we need this patch. In addition, we got three more vulnerabilities that were already exploited. Two of them are privilege escalation vulnerabilities, one in remote desktop. And then we also do have a type confusion vulnerability in Windows Manager that also then results in privilege escalation. Now, the sixth vulnerability here is a denial of service vulnerability in the remote access connection manager. So, this is really sort of the big, big thing here. We also have critical vulnerabilities in Microsoft Azure. I already mentioned them, actually, because they were patched in Azure directly. So, I think last week I may have mentioned those vulnerabilities. And another sort of interesting critical vulnerability that affects Microsoft Windows Defender, but only on Linux. So, not on Windows. And it can lead to a remote code execution. We often have this in security software like this, that, you know, unpackers, decompression often leads to bad memory allocations and such. So, that's probably what's going on here. So, if you're running Windows Defender on Linux, well, definitely make sure you update that and patch that. That's certainly something that you have to pay attention to because, well, it's supposed to protect you and it's supposed to deal with sort of, you know, unfiltered input that it's inspecting. And that's sort of, you know, why this is important. But other than that, well, I wouldn't say there's sort of anything super critical here. Like all these vulnerabilities I mentioned earlier, they still require that the user downloads and then launches essentially a script. So, it really just makes these type of exploits, which are, of course, still very common and easier if an attacker takes advantage of these sort of security feature bypass vulnerabilities. And a little side note to the Microsoft patch Tuesday. There is also, well, actually has already started an effort underway by Microsoft to update certificates being used for secure boot. I think I mentioned that before, but secure boot was originally introduced in 2011. The CAs, the certificate authorities being used for it, they had a lifetime of 15 years and, well, 2011 plus 15 gets you to 2026. So, later this year, these root certificate authorities are going to expire. Over the last couple of years already, many new PCs that you may have purchased did come with these updated certificate authority, certificates. So, they should be all set. But as part of these monthly updates, Microsoft is now pushing out the certificates to any older PCs that don't have yet current certificates. If you miss these updates, well, your PC will continue to function. The problem is that any updates to the boot system will require current working certificates. So, you'll basically be stuck with whatever boot system you have. And if there are vulnerabilities that pop up, which has happened in the past, you won't be able to apply any patches to it. So, definitely make sure this happens. But if you are reasonably current on your Windows patches, this should automatically be taken care of. And there was actually a little bit of a similar thing happening with Apple last week, a couple of weeks ago, where they pushed updates to some of their older operating systems. Now, this wasn't anything about secure boot, but a couple of authorities that Apple uses for things like iMessage and such, they're about to expire. So, these certificates basically kept that working. And same thing there. If you don't update those certificates, then even future updates that may be released may not work or cannot be applied because, well, they wouldn't be properly signed for these old operating systems. Well, if you downloaded 7SIP lately, double-check that you got it from the right website. Apparently, there are some YouTube tutorials around that are redirecting users to a website that's very plausible, but is delivering a trojanized copy of the software. The malicious website here is 7 -SIP.com. Very logic choice, actually, for someone to download the software from there. But the actual website is 7-SIP.org. So, not .com, it's .org. And there's also a dash between 7 and SIP. But, yeah, definitely make sure that you download your software from the correct source. And these things, of course, particular with the similarity here of the website, you would almost think that the fake website actually has kind of a better, more plausible domain name than the actual website. Well, that's it for today. We also had, of course, two Fortinet vulnerabilities, one in the sandbox and an authentication bypass in LDAP. But, well, too many of them. So, I'll just add the links to the show notes. And thanks for liking, subscribing, and talk to you again tomorrow. Bye. Thank you.





