In Depth: These experts are racing to protect AI from hackers. Time is running out Successfully compromising and exploiting the right accounts can allow cyber criminals to gain access to the tools and privileges they need to encrypt a whole network of machines with ransomware in a short amount of time. Meanwhile, BEC attacks – email attacks where employees are tricked into making financial transfers under false pretexts – can also occur in a short amount of time. Both ransomware and BEC attacks can be very costly for victims. To help protect networks from cyberattacks, Microsoft is expanding the automatic attack disruption in Microsoft 365 Defender, which is powered by artificial intelligence-driven threat hunting and detection capabilities, which were first unveiled last year. Also: The best VPN services This capability uses high-confidence extended detection and response (XDR) signals across endpoints, identities, email, and software-as-a-service apps, to contain cybersecurity attacks quickly and effectively, to stop attacks, and limit the impact to the victim. Microsoft is expanding its public preview of Microsoft 365 Defender, to help protect networks against ransomware and BEC attacks, two of the most common – and most costly – cybersecurity threats to businesses. To prevent BEC attacks, automatic attack disruption detects attacks and removes the attacker’s access to the environment by switching off the compromised account, therefore limiting their ability to send fraudulent emails, preventing money transfers and financial losses. And to prevent ransomware attacks, the technology isolates suspicious activity from a compromised device to prevent an attacker from using it to gain access to other machines and services that can be abused to spread the malicious payload. Also: The ransomware problem isn’t going away, and these grim figures prove it To ensure that the system isn’t actively quarantining false positives – and hindering legitimate users – Microsoft 365 Defender is trained with endpoint detection and response signals, along with insights from the continuous investigation of thousands of incidents by Microsoft’s research teams. Action will only be taken if the activity has been properly examined by the AI powering the tool and, if it’s concluded that the activity is malicious, the automatic response actions are triggered against entities identified as compromised – preventing further attacks. “This game-changing capability comes built-in with Microsoft 365 Defender and limits a threat actor’s progress early on – reducing the overall impact of an attack, from associated costs to loss of productivity,” said Eyal Haik, senior product manager at Microsoft.