SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Jim Walter

Jim Walter is a Senior Threat Researcher at SentinelOne focusing on evolving trends, actors, and tactics within the thriving ecosystem of cybercrime and crimeware. He specializes in the discovery and analysis of emerging cybercrime "services" and evolving communication channels leveraged by mid-level criminal organizations. Jim joined SentinelOne following ~4 years at a security start-up, also focused on malware research and organized crime. Previously, he spent over 17 years at McAfee/Intel running their Threat Intelligence and Advanced Threat Research teams.
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 3

Jim Walter / January 21, 2022

Cyber cops grab gang of Nigerian email scammers, BlackCat ransomware strikes Italian fashion giant, and the Red Cross suffers highly sensitive data leak.

Read More
BlackCat Ransomware Highly Configurable Rust Driven RaaS On The Prowl For Victims 6
labs
Crimeware

BlackCat Ransomware | Highly-Configurable, Rust-Driven RaaS On The Prowl For Victims

Jim Walter / January 18, 2022

With victims in the US, Australia and India, BlackCat is a new RaaS making a big impact. Learn more about this unique ransomware's behavior and IoCs.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 1

Jim Walter / January 7, 2022

FBI cracks the Spine Collector cyber thief case, Karakurt gang ransoms data without ransomware, and malicious videos plague 100 realtor websites.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 52

Jim Walter / December 24, 2021

Rideshare fraudster pleads guilty to cyber crimes, Microsoft patch fails to plug AD privilege escalation bugs, and AvosLocker uses Safe Mode to beat EDRs.

Read More
New Rook Ransomware Feeds Off The Code Of Babuk 7
labs
Crimeware

New Rook Ransomware Feeds Off the Code of Babuk

Jim Walter / December 23, 2021

Scavenging code leaked from Babuk, Rook's first victim was a bank and the theft of 1123 GB of data. Learn more about this new ransomware operator.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 50

Jim Walter / December 10, 2021

Feds indict notorious cyber crim active since 2009, ransomware forces retailer to shut doors, and TOR under pressure from threat actors and censors alike.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 48

Jim Walter / November 26, 2021

Mobile hacking gang taken offline by the SSU, Microsoft Defender fails to start after Microsoft patch, and Tardigrade APT malware hits bio facilities.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 46

Jim Walter / November 12, 2021

Cops seize REvil funds and arrest Ukrainian operator, Cl0p gang leaks data after company refuses to pay, and critical vulnerability hits GlobalProtect VPN.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 44

Jim Walter / October 29, 2021

Operation DarkHunTOR nabs 150 darkweb traders, Haron rebrands itself as Midas ransomware, and malicious NPM packages target Roblox users.

Read More
Spook Ransomware Prometheus Derivative Names Those That Pay Shames Those That Dont 6
labs
Crimeware

Spook Ransomware | Prometheus Derivative Names Those That Pay, Shames Those That Don’t

Jim Walter / October 28, 2021

New ransomware operator publishes victim details even if they pay. Our technical analysis shows how Spook is connected to other well-known malware families.

Read More
Previous
1 … 3 4 5 6 7 … 12
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.