Microsoft has recently alerted Windows 10 users that support for the OS will conclude on October 14, 2025.
Windows 10 was released in July 2015, and Microsoft committed to providing ten years of support. This operating system is the most widely used version of Windows, making up over 54% of the market share, which equates to more than 800 million users, as reported. Statista In 2024, Microsoft Windows was operational on 1.6 billion active devices.
Users who want to keep utilizing Windows 10 after its support ends can opt for Microsoft’s Extended Security Updates (ESU), which cost $30 annually. Nevertheless, failing to subscribe to these updates or migrate to Windows 11 could expose them to heightened cybersecurity threats.
Associated: Technology team head delivers surprising eight-word missive concerning duties
The technology company, which marked its 50th anniversary, th This month’s birthday hasn’t shared extensive details regarding the ESU program for typical users like they have done for their business clients. It could be an intentional strategy to prompt individuals to transition to Windows 11 instead of choosing the ESU extension, suggests the write-up. Windows Latest .
The gradual reduction of support is especially crucial, considering a newly arising cybersecurity threat that might present a significant danger to Microsoft's clients.

"A very grave danger" facing millions of Microsoft Windows users
A revised edition of the malicious software called Neptune RAT (Remote Access Trojan) poses "an exceptionally grave risk" to countless Windows users.
Cyfirma, a cybersecurity company based in Singapore, recently sounded an alarm about a piece of malicious software that has infiltrated various platforms including GitHub, Telegram, and YouTube. According to Cyfirma, this malware is frequently advertised as the "Most Advanced RAT."
Cyfrima characterizes Neptune RAT as an "advanced and extremely perilous" type of malicious software that can evade standard security defenses, pilfer passwords, and potentially wreck Windows operating systems. This Remote Access Trojan has the ability to infiltrate more than 270 programs, encompassing various web browsers, and includes functionalities such as ransomware attacks along with real-time desktop surveillance.
Related: Seasoned fund manager who predicted S&P 500 downturn shares unexpected new insight
Created with the intent to cause disruption and seize confidential information, Neptune RAT employs advanced anti-detection methods to remain active within the target's computer system over an extended duration.
After gaining foothold, it has the capability to completely dominate a device, retrieving confidential data and responding to additional commands from those controlling it.
The most disheartening aspect: the developer implies that there exists an even more potent iteration of this malware.
"For Ethical Reasons," but aims at Chrome, Opera, Brave & More
The developer of Neptune RAT, who released it without providing the source code, asserts that it is designed solely for "educational and ethical uses." However, the sophisticated features of this malicious software cast doubt on his statement.
The developer, currently residing in Saudi Arabia, states that this is a free version, implying the existence of a more advanced, paid version.
The sensitive data that Neptune Remote Access Trojan (RAT) can gather encompasses the user's identity, specifics of their computer, details related to the operating system, technical specs such as processor, memory, and serial numbers of hard drives, networking-related particulars, along with insights into any attached USB peripherals.
Developed using Visual Basic .NET, this RAT has the capability to exchange clipboard content for the attacker’s cryptocurrency wallet addresses. To complicate reverse engineering efforts, its source code incorporates Arabic script and emoji symbols.
Furthermore, Neptune RAT has the capability to retrieve and decipher passwords stored in various web browsers including Chrome, Opera, Chromium, 360Chrome, Brave, Yandex, among others. The extracted information is subsequently sent to the malicious actor’s server.
To reduce the likelihood of an attack, Cyfirma suggests implementing various strategies.
- Utilizing threat intelligence for identifying signs of compromise.
- Using sophisticated endpoint security tools that offer continuous surveillance.
- Implementing host-based intrusion prevention systems.
- Using robust email security measures and frequent vulnerability assessments.
- You should download software exclusively from reliable sources.
The lowest stock price in over 15 months
In 2024, Microsoft announced revenues totaling $245.1 billion, marking a rise of 15.67% compared to the previous year. The net income climbed by 22% to hit $88.1 billion, bringing the earnings per share up to $11.8. However, over the course of the year, Microsoft’s stock price has dropped by 15.88%, currently standing at $354.56.
On April 7th, prior to Cyfirma's alert regarding the Neptune RAT, Microsoft's shares fell to $350.09 during the early trading session, representing its lowest value in over one year. Although it ended the day at $357.86 and saw signs of rebounding on Tuesday morning, it was still trading beneath its nadir from the past fifteen months.
Even an event as important as the company's 50th anniversary couldn’t protect its stocks from the market’s response to the growing cybersecurity risk and the continuous effect of Trump’s tariffs.
Related: Seasoned fund manager presents bold prediction for the S&P 500