SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Research Engineer at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 15

Phil Stokes / April 9, 2021

Pwn2Own highlights the right path for talented hackers, organizations warned about critical SAP bugs, and APT34 targets job hunters with novel backdoor.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 13

Phil Stokes / March 26, 2021

Thieves steal user data from Carding Mafia crime site, OpenSSL vulnerable to denial of service attacks, and an ethical researcher gets shopped to the cops.

Read More
New MacOS Malware XcodeSpy Targets Xcode Developers With EggShell Backdoor 6
labs
Security & Intelligence

New macOS Malware XcodeSpy Targets Xcode Developers with EggShell Backdoor

Phil Stokes / March 18, 2021

Targeting software developers is one route to a successful supply chain attack. Now threat actors are going after Apple developers through the Xcode IDE.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 10

Phil Stokes / March 5, 2021

Darknet hacker forums learn what it's like to be hacked, Chinese APT exploits MS Exchange Server, and the SolarWinds breach turns up 3 new malware families.

Read More
5 Things You Need To Know About Silver Sparrow 1
labs

Silver Sparrow Malware: 5 Things You Need to Know

Phil Stokes / February 22, 2021

Read here for all the need to know details and stay one step ahead of the latest macOS threat. IOCs contained within.

Read More
20 Common Tools Techniques Used By MacOS Threat Actors Malware 6
labs
Security Research

20 Common Tools & Techniques Used by macOS Threat Actors & Malware

Phil Stokes / February 16, 2021

Threat hunting on macOS? These are the tools malware most often leverages, with ITW examples, MITRE behavioral indicators and links to further research.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 7

Phil Stokes / February 12, 2021

SIM-swapping gang targeting US celebs gets busted in the UK, zero days haunt Chrome and Windows, and hackers waltz past weak security in public water system.

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 4

Phil Stokes / January 22, 2021

Biden injects money & expertise into U.S. cybersecurity, scammers leave stolen enterprise creds in plain sight, and adult website leaks 2m users' details.

Read More
FADE DEAD   Adventures In Reversing Malicious Run Only AppleScripts 2
labs
Security Research

FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts

Phil Stokes / January 11, 2021

We show how to statically reverse run-only AppleScripts for the first time, and in the process reveal new IoCs of a long-running macOS Cryptominer campaign.

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 1

Phil Stokes / January 1, 2021

CISA offers tool to aid IR teams in wake of SolarWinds, a COVID-19 testing lab is taken out by ransomware, and education charity GetSchooled gets pwned.

Read More
Previous
1 … 8 9 10 11 12 … 20
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.