SentinelLabs Logo RGB WhitePurp
ABOUT
CVE DATABASE
CONTACT
VISIT SENTINELONE.COM

Jim Walter

Jim Walter is a Senior Threat Researcher at SentinelOne focusing on evolving trends, actors, and tactics within the thriving ecosystem of cybercrime and crimeware. He specializes in the discovery and analysis of emerging cybercrime "services" and evolving communication channels leveraged by mid-level criminal organizations. Jim joined SentinelOne following ~4 years at a security start-up, also focused on malware research and organized crime. Previously, he spent over 17 years at McAfee/Intel running their Threat Intelligence and Advanced Threat Research teams.
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 1

The Good, the Bad and the Ugly | 5 minute read
Read More >
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 52

The Good, the Bad and the Ugly | 4 minute read
Read More >
New Rook Ransomware Feeds Off The Code Of Babuk 7
labs
Crimeware

New Rook Ransomware Feeds Off the Code of Babuk

Jim Walter / December 23, 2021

Scavenging code leaked from Babuk, Rook's first victim was a bank and the theft of 1123 GB of data. Learn more about this new ransomware operator.

Read More
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 50

The Good, the Bad and the Ugly | 5 minute read
Read More >
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 48

The Good, the Bad and the Ugly | 4 minute read
Read More >
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 46

The Good, the Bad and the Ugly | 4 minute read
Read More >
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 44

The Good, the Bad and the Ugly | 4 minute read
Read More >
Spook Ransomware Prometheus Derivative Names Those That Pay Shames Those That Dont 6
labs
Crimeware

Spook Ransomware | Prometheus Derivative Names Those That Pay, Shames Those That Don’t

Jim Walter / October 28, 2021

New ransomware operator publishes victim details even if they pay. Our technical analysis shows how Spook is connected to other well-known malware families.

Read More
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 42

The Good, the Bad and the Ugly | 4 minute read
Read More >
sentinelone

Negotiation is a Hostile Act | Ransomware Gangs Turn Up the Heat on Victims

For CISO/CIO | 7 minute read
Read More >
Previous
1 … 3 4 5 6 7 … 11
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
    Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
    June 9, 2025
  • FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    May 8, 2025
  • Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    April 28, 2025

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2025 SentinelOne, All Rights Reserved.