SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Jim Walter

Jim Walter is a Senior Threat Researcher at SentinelOne focusing on evolving trends, actors, and tactics within the thriving ecosystem of cybercrime and crimeware. He specializes in the discovery and analysis of emerging cybercrime "services" and evolving communication channels leveraged by mid-level criminal organizations. Jim joined SentinelOne following ~4 years at a security start-up, also focused on malware research and organized crime. Previously, he spent over 17 years at McAfee/Intel running their Threat Intelligence and Advanced Threat Research teams.
Ikaruz Ftr2
labs

Ikaruz Red Team | Hacktivist Group Leverages Ransomware for Attention Not Profit

Jim Walter / May 21, 2024

Politically-motivated attacks involving ransomware are on the rise as hacktivists aim to increase their impact through easily available tools.

Read More
Ransomware Evolution Ftr
labs

Ransomware Evolution | How Cheated Affiliates Are Recycling Victim Data for Profit

Jim Walter / April 24, 2024

Learn how data leak site operators like RansomHub and Dispossessor are feeding a new extortion cycle as the ransomware ecosystem evolves. 

Read More
December 2023 Cybercrime Update Extortion Trends Identity Focused Attacks Counter Operations 1
labs

February 2024 Cybercrime Update | Commercial Spyware, AI-Driven APTs & Flawed RMMs

Jim Walter / February 27, 2024

Learn about the latest trends in cybercriminal activity, new actors, novel threats and evolving tools. Here's February's update.

Read More
From Underground Commodity To Open Source Threat 7
labs

Kryptina RaaS | From Underground Commodity to Open Source Threat

Jim Walter / February 14, 2024

Source code for Linux RaaS has the potential to proliferate and become a serious threat to cloud environments.

Read More
December 2023 Cybercrime Update Extortion Trends Identity Focused Attacks Counter Operations 1
labs

January 2024 Cybercrime Update | Exploitation of Known CVEs, Crypto Drainers & Ransomware Updates

Jim Walter / January 25, 2024

Learn about the latest trends in cybercriminal activity, new actors, novel threats and evolving tools. Here's January's update.

Read More
Understanding DaaS 13
labs

The Rise of Drainer-as-a-Service | Understanding DaaS

Jim Walter / January 16, 2024

Learn how threat actors are targeting high-profile social media accounts to distribute phishing links and profit from crypto drainer malware.

Read More
Insights In The Wake Of The Everything Prank 4
labs

Unseen Threats in Software Development | The Perils of Trojanized NPM Packages

Jim Walter / January 8, 2024

Learn how attackers can exploit npm packages and what organizations can do to secure the supply chain.

Read More
December 2023 Cybercrime Update Extortion Trends Identity Focused Attacks Counter Operations 1
labs

December 2023 Cybercrime Update | Extortion Trends, Identity-Focused Attacks & Counter-Operations

Jim Walter / December 19, 2023

Learn about the latest trends in cybercriminal activity, new actors, novel threats and evolving tools. Here's December's update.

Read More
Mallox Resurrected Ransomware Attacks Exploiting MS SQL Continue To Burden Enterprises 13
labs

Mallox Resurrected | Ransomware Attacks Exploiting MS-SQL Continue to Burden Enterprises

Jim Walter / December 13, 2023

Learn about the Mallox RaaS and how operators are continuing to compromise enterprises and demand ransoms for stolen data.

Read More
Iran Backed Cyber Av3ngers Escalates Campaigns Against U.S. Critical Infrastructure 1
labs

Iran-Backed Cyber Av3ngers Escalates Campaigns Against U.S. Critical Infrastructure

Jim Walter / November 30, 2023

Water and wastewater treatment plants are the latest critical infrastructure to come under attack. Learn how to mitigate the risks.

Read More
Previous
1 2 3 4 … 12
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.