The source can be from emails, email attachments, bots, Trojans, and other sources that can be introduced via any computer file type from any device type including all forms of mobile devices, the cloud, the web and even via a virtual private network (VPN).
FORBES: Next-Generation Firewalls: What Makes Them Next-Gen