SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Research Engineer at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 50

Phil Stokes / December 11, 2020

Facebook fingers Vietnamese company behind APT32 activity, Russian APTs exploit critical VMware bug, and COVID vaccine approval body is hit by cyberattack.

Read More
APT32 Multi Stage MacOS Trojan Innovates On Crimeware Scripting Technique 7
labs
Adversary

APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique

Phil Stokes / December 2, 2020

Vietnamese-linked APT group OceanLotus have innovated and imitated in their latest macOS trojan, while also leaving a mysterious hard-coded calling card.

Read More
New GBU Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 47

Phil Stokes / November 20, 2020

Users invited to give feedback on DoH security feature, REvil hits managed web hosting provider for $500K, and video-conferencing software lets in "ghosts".

Read More
What Happened To My Mac  Apples OCSP Apocalypse 2
labs

What Happened to My Mac? Apple’s OCSP Apocalypse

Phil Stokes / November 16, 2020

Macs worldwide became unresponsive last week while attempting to launch 3rd party apps. What caused the issue and what does it mean for your Mac's security?

Read More
MacOS Big Sur Has Landed   Heres 10 Essential Security Tips You Should Know 4
labs

macOS Big Sur Has Landed | 10 Essential Security Tips You Should Know

Phil Stokes / November 12, 2020

The latest iteration of Apple's macOS operating system, Big Sur, brings some big changes. Are you ready for its impact on enterprise security?

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 45

Phil Stokes / November 6, 2020

Russian cops make a rare catch of prolific malware developer, Ragnar Locker goes on the rampage and leaked data threatens cannabis growers with exposure.

Read More
Resourceful MacOS Malware Hides In Named Fork 5
labs
Security Research

Resourceful macOS Malware Hides in Named Fork

Phil Stokes / November 5, 2020

Threat actors targeting macOS are deploying a new trick to hide payloads and avoid detection thanks to an old technology: the named resource fork.

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 41

Phil Stokes / October 9, 2020

Apple rewards hackers for exposing critical flaws, an unknown APT repurposes Hacking Team's UEFI malware, and ransomware halts classes for 25000 students.

Read More
How To Catch A Spy   Detecting FinFisher Spyware On MacOS 4
labs

How to Detect FinFisher Spyware on macOS

Phil Stokes / September 28, 2020

Amnesty International's latest report fingers FinFisher for targeting macOS users with commercial spyware. So how would you know if you were infected?

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 38

Phil Stokes / September 18, 2020

APT41 gang indicted for 100s of hacks, new campaign against U.S. Gov exploits OSINT & unpatched vulns, and a misdirected ransomware attack ends in tragedy.

Read More
Previous
1 … 9 10 11 12 13 … 20
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.