Unit 42, the Palo Alto Networks threat intelligence team, will be appearing on a live webcast and Q&A with Dark Reading tomorrow, Thursday, August 28 at 2:00 p.m. EDT.
![DR-logo](https://unit42.paloaltonetworks.com/wp-content/uploads/2014/08/DR-logo.png)
Join Ryan Olson, intelligence director, Vishaal Hariprasad, architect, threat intelligence, and Peter Krass, moderator and Dark Reading contributing editor, for an in-depth look at a series of recent attacks against businesses emanating from Nigeria and a new breed of attackers that are using many of the same tools more advanced cyber crime and espionage groups have deployed in the past.
Register for free here. Download 419 Evolution, Unit 42's recent research paper here.
Related Cybercrime Resources
![Pictorial representation of graph neural networks. Digital representation of a human eye with binary code superimposed over it, emphasizing concepts of cybersecurity and digital surveillance.](https://unit42.paloaltonetworks.com/wp-content/uploads/2025/01/02_Security-Technology_Category_1920x900-786x368.jpg)
![Pictorial representation of attackers leveraging Active Directory or LDAP. Close-up view of a server rack panel with illuminated lights and a digital display reading 'SYSTEM HACKED'.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/12/02_Vulnerabilities_1920x900-786x368.jpg)
![Pictorial representation of HeartCrypt. A laptop on a desk displaying a vivid graphical interface with cyber security and data analytics themes, illuminated by red ambient lighting.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/12/03_Malware_Category_1920x900-786x368.jpg)
![A pictorial representation of Akira ransomware, distributed by Howling Scorpius. A person's hand typing on a keyboard with a digital screen displaying the word "password" highlighted in blue, set against a backdrop of various cybersecurity interface graphics.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/11/09_Cybercrime_Category_1920x900-786x368.jpg)
![Pictorial representation of a threat like BlackSuit ransomware. An illustration of a modern workspace with a laptop displaying cybersecurity icons, surrounded by stacks of coins and a credit card, all depicted in a neon, digital art style.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/11/04_Ransomware_Category_1920x900-786x368.jpg)
![Pictorial representation of global companies paying North Korean IT workers. Abstract digital world map with interconnected lines and dots, depicting global data and network connections, highlighted in blue and red colors.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/11/08_Nation-State-cyberattacks_1920x900-786x368.jpg)
![A pictorial represntation of cybercrime like Silent Skimmer. A glowing red padlock on a wet surface with red particles floating in a misty, dark blue background.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/11/11_Cybercrime_Category_1920x900-786x368.jpg)
![A pictorial representation of Cicada3301 ransomware. Digital rendering of a transparent padlock superimposed with programming code and placed on a network of connected databases, symbolizing cybersecurity and data protection.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/09/06_Ransomware_Category_1920x900-786x368.jpg)