SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Research Engineer at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
Coming Out Of Your Shell  From Shlayer To ZShlayer 6
labs

Coming Out of Your Shell: From Shlayer to ZShlayer

Phil Stokes / September 8, 2020

Shlayer malware continues to hit macOS (and the headlines) with multiple campaigns. The latest uses obfuscated Zsh scripts in an attempt to evade detection.

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 35

Phil Stokes / August 28, 2020

Employee foils Russian ransomware plot, QakBot's rapid evolution poses new risks, and flaw in file sharing on Google Drive could expose users to malware.

Read More
Going Kextless   Why We All Need To Transition Away From Kernel Extensions 10
labs

Going Kextless | Why We All Need to Transition Away from Kernel Extensions

Phil Stokes / August 12, 2020

Apple have been encouraging developers to abandon Kernel Extensions (kexts). We think that's a great idea for security products. Here's why.

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 31

Phil Stokes / July 31, 2020

EU rolls out sanctions against hacking crews, QSnatch malware infects thousands of NAS devices and a threat actor hacks news providers to plant fake stories.

Read More
Four Distinct Families Of Lazarus Malware Target Apples MacOS Platfo 5
labs

Four Distinct Families of Lazarus Malware Target Apple’s macOS Platform

Phil Stokes / July 27, 2020

In recent weeks, there's been a sharp uptick in Lazarus-related macOS malware, with several families of trojanized apps and backdoors targeting the platform.

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 28

Phil Stokes / July 10, 2020

Researchers crack macOS ransomware encryption, USBs pose increased risk to critical infrastructure, and 15bn stolen credentials are for sale on the DarkNet.

Read More
EvilQuest  A New MacOS Malware Rolls Ransomware Spyware And Data Theft Into One 4
labs

“EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One

Phil Stokes / July 8, 2020

A new macOS malware threat is more than it seems. With built-in ransomware, data stealer and spyware capabilities, it is also iterating rapidly.

Read More
How A New MacOS Malware Dropper Delivers VindInstaller Adware 5
labs

How a New macOS Malware Dropper Delivers VindInstaller Adware

Phil Stokes / June 29, 2020

A recently-discovered macOS malware dropper uses a new trick to deliver known malware, bypassing signature-based AV detections along the way.

Read More
9 Big Surprises For Enterprise Security Coming In MacOS Big Sur 5
labs

macOS Big Sur | 9 Big Surprises for Enterprise Security

Phil Stokes / June 24, 2020

Some big changes are coming to macOS security. We round up the most significant developments announced at WWDC 2020 that could affect enterprise security.

Read More
Blog Weekly Weekly
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 24

Phil Stokes / June 12, 2020

Election 2020 security gets a boost, researchers reveal more Intel side-channel attacks, and hackers-for-hire target U.S. nonprofit and advocacy groups.

Read More
Previous
1 … 10 11 12 13 14 … 20
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.