SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Jim Walter

Jim Walter is a Senior Threat Researcher at SentinelOne focusing on evolving trends, actors, and tactics within the thriving ecosystem of cybercrime and crimeware. He specializes in the discovery and analysis of emerging cybercrime "services" and evolving communication channels leveraged by mid-level criminal organizations. Jim joined SentinelOne following ~4 years at a security start-up, also focused on malware research and organized crime. Previously, he spent over 17 years at McAfee/Intel running their Threat Intelligence and Advanced Threat Research teams.
Leveraging The Law Exposing Incriminating Data And Other New Tactics In Cyber Extortion 7
labs

Leveraging the Law, Exposing Incriminating Data and Other New Tactics in Cyber Extortion

Jim Walter / November 29, 2023

Explore the evolving landscape of cybercrime. Learn how threat actors are using legal obligations and data exposure threats as new means of extortion.

Read More
September 2023 Cybercrime Analysis Unveiling The Latest Trends Threat Actor Tactics 1
labs

Nov 2023 Cybercrime Update | LLMs, Ransomware and Destructive Wipers Proliferate in Recent Attacks

Jim Walter / November 16, 2023

Learn about the latest trends in cybercriminal activity, new actors, novel threats and evolving tools. Here's November's update.

Read More
C3RB3R Ransomware Ongoing Exploitation Of CVE 2023 22518 Targets Unpatched Confluence Servers 3
labs

C3RB3R Ransomware | Ongoing Exploitation of CVE-2023-22518 Targets Unpatched Confluence Servers 

Jim Walter / November 14, 2023

Learn how threat actors are exploiting Confluence CVE-2023-22518 to deploy Cerber ransomware on Linux and Windows hosts.

Read More
Hacktivism In The Israel Hamas Conflict Citizen Data Leaked Using Old Malware 6
labs

Hacktivism in the Israel-Hamas Conflict | Citizen Data Leaked Using Old Malware

Jim Walter / October 26, 2023

Hacktivists leverage political chaos to launch opportunistic cyber attacks. Learn about recent activity seen amidst the Israel-Hamas war.

Read More
September 2023 Cybercrime Analysis Unveiling The Latest Trends Threat Actor Tactics 1
labs

Oct 2023 Cybercrime Update | Disinformation, DDoS and Scams as Gangs Look to Exploit Turmoil

Jim Walter / October 18, 2023

Learn about the latest trends in cybercriminal activity, new actors, novel threats and evolving tools. Here's October's update.

Read More
LostTrust Ransomware Latest Multi Extortion Threat Shares Traits With SFile And Mindware 1
labs

LostTrust Ransomware | Latest Multi-Extortion Threat Shares Traits with SFile and Mindware

Jim Walter / October 5, 2023

Discover the technical overlaps between LostTrust Ransomware, SFile and Mindware in this in-depth analysis of the latest multi-extortion cyber threats.

Read More
September 2023 Cybercrime Analysis Unveiling The Latest Trends Threat Actor Tactics 1
labs

Sep 2023 Cybercrime Update | New Ransomware Threats and the Rising Menace of Telegram 

Jim Walter / September 13, 2023

Learn about the latest trends in cybercriminal activity, new actors, novel threats and evolving tools. Here's September's update.

Read More
Threat Actor Interplay Good Days Victim Portals And Their Ties To Cloak 3
labs

Threat Actor Interplay | Good Day’s Victim Portals and Their Ties to Cloak

Jim Walter / August 30, 2023

Analysis of Good Day ransomware reveals victim data is being leaked through the Cloak extortion site.

Read More
From Conti To Akira Decoding The Latest Linux ESXi Ransomware Families 5
labs

From Conti to Akira | Decoding the Latest Linux & ESXi Ransomware Families

Jim Walter / August 23, 2023

Ransomware operators are reusing leaked codebases to create novel attack techniques, targeting Linux servers and hosted virtual machines.

Read More
LOLKEK Unmasked An In Depth Analysis Of New Samples And Evolving Tactics 1
labs

LOLKEK Unmasked | An In-Depth Analysis of New Samples and Evolving Tactics

Jim Walter / August 9, 2023

Threat actors consistently evolve and iterate their operations. We examine new LOLKEK samples that show changing payloads, tactics, and artifacts.

Read More
Previous
1 2 3 4 5 … 12
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Silent Brothers | Ollama Hosts Form Anonymous AI Network Beyond Platform Guardrails
    Silent Brothers | Ollama Hosts Form Anonymous AI Network Beyond Platform Guardrails
    January 29, 2026
  • LABScon25 Replay | How to Bug Hotel Rooms v2.0
    LABScon25 Replay | How to Bug Hotel Rooms v2.0
    January 21, 2026
  • LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams
    LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams
    January 20, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.