• Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Industries
  • Partners
  • Why Palo Alto Networks?
  • Company
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Explore Zero Trust

2021 Unit 42 Ransomware Threat Report

Unit 42 brings together world-class cyber researchers and elite incident responders to protect our digital way of life. With a deep-rooted reputation in delivering industry-leading threat intelligence, Unit 42 is now expanding its scope to provide state-of-the-art incident response and cyber risk management services. Our incident response consultants will serve as trusted partners to respond fast and contain threats completely, so you can get back to business in no time.
See more

A Leader in the 2021 Gartner® Magic Quadrant™ for Network Firewalls

For the 10th time in a row, Gartner recognized us as a Leader in Network Firewalls, positioned highest in execution and furthest in vision, in their 2021 report.
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Type

By Type

  • Research Reports (116)
  • White Paper (2)
  • Article (1)
  • Infographic (1)
By Topic

By Topic

  • Cloud Security (22)
  • Public Cloud Security (16)
  • Network Security (16)
  • Private Cloud Security (14)
  • Threat Detection and Prevention (9)
  • Secure Access Service Edge (SASE)  (9)
  • Security Operations (6)
  • Google Cloud (4)
  • Microsoft Azure (4)
  • Amazon Web Services (4)
  • Security Operating Platform (4)
  • Zero Trust (3)
  • Security Ecosystem (3)
  • Data Center (3)
  • Secure Remote Workforce (3)
  • Network Security Management (2)
  • Endpoint Security (1)
  • Saas Security (1)
  • Remote Workforce (1)
  • Mobile Security (1)
  • + Show More
By Industry

By Industry

  • IoT (4)
  • Financial Services (3)
  • Healthcare (2)
  • Federal Government (2)
  • State & Local Government (1)
  • Manufacturing (1)
  • + Show More
By Product Category

By Product Category

  • + Show More
By Features

By Features

  • + Show More
By Technologies

By Technologies

  • + Show More
By Services

By Services

  • + Show More
By Audience

By Audience

  • + Show More
By Language

By Language

  • English (20)
Displaying 91 - 116 of 116
Pagination
  • 1
  • 2
  • 3
  • 4

Research Reports

Executive Summary: Unit 42 Cloud Threat Report

This executive summary highlights key findings from the February 2020 edition of the Unit 42 Cloud Threat Report. Data shows Data shows nearly 200k insecure IaC templates in use, 43% of cloud databases are not encrypted, and 60% of cloud storage services have logging disabled.
February 5, 2020

Research Reports

DevOps Summary: Unit 42 Cloud Threat Report

This summary for DevOps audiences highlights key findings from the February 2020 edition of the Unit 42 Cloud Threat Report. Data shows nearly 200k insecure IaC templates in use, 26% of insecure Kubernetes® configurations run containers with unrestricted permissions, and 27% of Terraform® SSH (port 22) resources are exposed to the internet.
February 5, 2020

Research Reports

Making Secure SD-WAN Manageable: Take an Integrated Approach

Learn how consolidating and integrating networking and security functions, as well as unifying management and monitoring with SD-WAN in the branch, can lead to more secure and efficient operations.
January 9, 2020

Research Reports

The 2019 State of SOAR Report

Every security team has its own set of security tools, competencies, common use cases and compliance requirements. One of the few common threads that weaves through all these elements is the steps for responding to a security incident. Demisto, now part of Palo Alto Networks, sponsored a study of security professionals around the world to delve deeper into their challenges across the incident response (IR) lifecycle, the tools they use and the capabilities they feel are missing from their tool stacks.
November 13, 2019

Research Reports

ESG Research Highlights: Leveraging DevSecOps to Secure Cloud-native Applications

ESG conducted a research survey with the intent to gain insight into the current and future processes involved in securing cloud-native applications, the challenges that arise when securing cloud-native applications, and the product requirements companies will demand as they continue to secure more cloud-native applications.
October 18, 2019

Research Reports

Impacts of Cyberattacks on IoT Devices

This paper discusses the modern IoT attack kill chain and the impact of these attacks on IoT devices.
October 16, 2019

White Paper

8-TIME GARTNER MAGIC QUADRANT LEADER

Gartner’s 2019 Magic Quadrant for Network Firewalls Report recognizes Palo Alto Networks a Leader for the EIGHTH time in a row, with the highest position in ability to execute and furthest in completeness of vision.
September 19, 2019

Research Reports

Unit 42 Report - 5 Key Cloud Security Trends

This report highlights key learnings from these incidents along with research by Unit 42’s cloud research team to shed light on current and emerging trends. Moreover, it offers tips and best practices to help organizations ensure business-critical data across their public cloud environments – Google Cloud, AWS, and Azure – is secure.
August 15, 2019

Research Reports

Unit 42 Cloud Threat Report, Vol. 1

This Unit 42 report highlights key learnings from public cloud security incidents and presents original research from the cloud-focused division of the Unit 42 threat research team.
July 24, 2019

Research Reports

NSS Labs NGFW Group Test Report on Palo Alto Networks PA-5220

In 1H 2019, NSS Labs performed an independent test of the Palo Alto Networks PA-5220. This comprehensive testing compared security effectiveness, performance and cost among 12 NGFW products. Palo Alto Networks achieved the highest security effectiveness score and a "Recommended" rating."
July 17, 2019

Research Reports

2019 Cybersecurity Insiders Report

Read the full report to learn more the current state and perception of cloud security.
July 8, 2019

Research Reports

Handbook: How to Create a Modern Ransomware Strategy

Read this handbook to gain insight and best practices from your peers and industry experts on creating a modern ransomware strategy.
October 4, 2018

Research Reports

2018 NSS Labs Next Generation Intrusion Prevention (NGIPS) Report

NSS Labs performed an independent test of the Palo Alto Networks PA-5220 PAN-OS 8.1.2. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation intrusion Prevention System (NGIPS) Test Methodology v4 and the NSS Labs Evasion Test Methodology v1.1. Testing was conducted free of charge and NSS did not receive any compensation in return for Palo Alto Network’s participation.
September 20, 2018

Research Reports

2018 NSS Labs NGFW Group Test Report

Palo Alto Networks® is focused on securing your business with a prevention-focused architecture you can easily deploy and operate. In its 2018 “Next Generation Firewall Group Test Report,” NSS Labs® recognized this and gave our NGFW a Recommended rating.
July 17, 2018

White Paper

Forrester Traps TEI Study

Forrester Traps TEI Study
November 6, 2017

Research Reports

Protecting Your Clouds.

In this research report, we present the results of a recent Tech Pro Research survey, asking CBS Interactive’s readers about their current cloud activities, security operations, and priorities. You'll learn how IT departments are planning their implementation of private and hybrid cloud infrastructure, how they're dealing with concerns about insider threats, their perceptions of shadow IT, and how you can protect your organization in a challenging threat landscape.
Santa Clara, CAOctober 30, 2017

Research Reports

Credential Theft: Shamoon 2

Credential theft is the oxygen of malicious activity: nearly always there, necessary, but never noticed. According to the 2016 Verizon® Data Breach Report, 63 percent of confirmed data breaches leveraged credentials, and the use of stolen credentials is the most common approach in web-app attacks. Credential theft is a staple in the playbooks of sophisticated attackers, like the Sofacy threat actor group, and unsophisticated attackers alike.
Santa ClaraMay 9, 2017

Research Reports

Credential-Based Attacks Research

Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse In this white paper, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.
Santa ClaraMarch 21, 2017

Research Reports

SILVERTERRIER: The Next Evolution in Nigerian Cybercrime

Unit 42 tracks Nigerian Threat Actors and finds they've evolved into capable and formidable adversaries successfully attacking major companies and governments.
November 3, 2016

Research Reports

Exploit Kits Research

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims’ machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. To understand this phenomenon, we must understand the ecosystem that surrounds exploit kits, including the actors, campaigns and terminology involved.
October 18, 2016

Research Reports

Cyber Espionage: Behind the Scarlet Mimic

The Palo Alto Networks threat research team, Unit 42, has spent the last seven months investigating a series of attacks, determining that they are the result of a long-standing cyber espionage campaign. The campaign, which we refer to as “Scarlet Mimic,” has activity dating back over four years. The result of our analysis has allowed us to connect a series of disparate attacks into a coherent picture of the Scarlet Mimic operation, which has targeted human rights activists, as well as organizations with knowledge about these groups, including government entities.
January 24, 2016

Research Reports

Real-World Threat & Application Reporting

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.
Santa ClaraOctober 5, 2015

Research Reports

CoolReaper: The Coolpad Backdoor

CoolReaper: The Coolpad Backdoor New research from Unit 42 confirms security risk in Coolpad devices Palo Alto Networks researchers have uncovered CoolReaper, a backdoor contained in millions of Android devices sold by manufacturer Coolpad. CoolReaper exposes users to potential malicious activity and appears to have been installed and maintained by Coolpad despite objections from customers. Due to the unique way Coolpad modifies the Android OS, it is difficult for Android antivirus programs to identify and remove this backdoor.
Palo Alto Networks, Santa Clara, CADecember 17, 2014

Research Reports

WireLurker: A New Era in iOS and OS X Malware

Read the report about WireLurker and its potential impact, and get recommendations for preventing and mitigating WireLurker and other iOS and OS X malware threats.
Santa Clara, CANovember 5, 2014

Research Reports

419 Evolution

In the past three months Palo Alto Networks has identified a series of attacks emanating from Nigerian actors against our customers in Taiwan and South Korea. Our team is tracking this activity under the code name Silver Spaniel. These attacks have deployed commodity tools that can be purchased for small fees on underground forums and deployed by any individual with a laptop and an e-mail address. Read the report by Palo Alto Networks Unit 42.
July 22, 2014

Research Reports

Webcast: Stopping the Hemorrhaging of Personal Health Information

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?
Santa ClaraJuly 22, 2014
Displaying 91 - 116 of 116
Pagination Bottom
  • 1
  • 2
  • 3
  • 4

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved