SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Jim Walter

Jim Walter is a Senior Threat Researcher at SentinelOne focusing on evolving trends, actors, and tactics within the thriving ecosystem of cybercrime and crimeware. He specializes in the discovery and analysis of emerging cybercrime "services" and evolving communication channels leveraged by mid-level criminal organizations. Jim joined SentinelOne following ~4 years at a security start-up, also focused on malware research and organized crime. Previously, he spent over 17 years at McAfee/Intel running their Threat Intelligence and Advanced Threat Research teams.
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 8

Jim Walter / February 21, 2020

Ring rolls out extra security with mandatory MFA, ransomware hits U.S natural gas plant and Russian APT gets called out for attacks on Georgian TV stations.

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 5

Jim Walter / January 31, 2020

Magecart e-commerce malware gets disrupted by Interpol, Emotet trojan exploits coronavirus health scare and AV Vendor sells users' data to Google and others.

Read More
New Snake Ransomware Adds Itself To The Increasing Collection Of Golang Crimeware
labs
Crimeware

New Snake Ransomware Adds Itself to the Increasing Collection of Golang Crimeware

Jim Walter / January 23, 2020

The ransomware crime spree continues with threat actors increasingly turning to Golang as their language of choice. New entrant Snake is just the latest.

Read More
Evil Markets   Selling Access To Breached MSPs To Low Level Criminals 8
labs

Evil Markets | Selling Access To Breached MSPs To Low-Level Criminals

Jim Walter / January 16, 2020

Sophisticated hackers compromise MSPs and other businesses, then sell access to low-level criminals. Take a look inside the trade and learn how to stay safe

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 52

Jim Walter / December 27, 2019

GozNym malware authors get jail time, a critical flaw puts 80,000+ Citrix servers at risk and Chinese-backed APT20 hackers find their way past 2FA.

Read More
Ransomware As A Service   What Are Cryptonite Recoil And Ghostly Locker  1
labs

RaaS: What are Cryptonite, Recoil and Ghostly Locker?

Jim Walter / December 16, 2019

A look inside the alarming rise of RaaS projects offering "No Coding Skill Required" ransomware and using slick marketing tricks to tempt would-be criminals.

Read More
How MedusaLocker Ransomware Aggressively Targets Remote Hosts 1
labs

MedusaLocker Ransomware: Encryption, Costs, and Protection

Jim Walter / November 28, 2019

MedusaLocker aggressively scans remote drives, keeps searching for new files to encrypt. What's behind the latest strain of malware to bypass legacy AV?

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 47

Jim Walter / November 22, 2019

Louisiana State gets one over on Ryuk ransomware, cryptocurrency users get served malware and a video sharing site exposes its users' naked secrets.

Read More
Build Your Own Ransomware 1
labs

Build Your Own Ransomware (Project Root) | Behind Enemy Lines Part 2

Jim Walter / November 20, 2019

In Part 2 of our Ransomware As A Service (RaaS) series, we look at Project Root's offline builder & how threat actors can easily customize the source code.

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 45

Jim Walter / November 8, 2019

Google Play Store gets new security checks, ransomware keeps on rolling and scammers target Trend Micro customers with perfect storm tech support scam.

Read More
Previous
1 … 9 10 11 12
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026
  • Silent Brothers | Ollama Hosts Form Anonymous AI Network Beyond Platform Guardrails
    Silent Brothers | Ollama Hosts Form Anonymous AI Network Beyond Platform Guardrails
    January 29, 2026
  • LABScon25 Replay | How to Bug Hotel Rooms v2.0
    LABScon25 Replay | How to Bug Hotel Rooms v2.0
    January 21, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.