SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Research Engineer at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 9

Phil Stokes / February 28, 2020

Mozilla beefs up Firefox security, a new Wi-fi vuln hits a billion devices, and DoppelPaymer ransomware enrols stubborn victims into public 'Hall of Shame'.

Read More
Worried Whether Your Mac Can Get A Virus  Lets Talk Facts 1
labs

Can Apple Macs Get Viruses? Let’s Talk Facts

Phil Stokes / February 19, 2020

Do Macs get viruses? Are Apple's built-in tools robust enough to prevent an attack? And how would you know if your Macs were compromised, anyway?

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 7

Phil Stokes / February 14, 2020

Microsoft and others go on a bug-fixing spree, Emotet worms its way into nearby Wifi networks, and the US breaks crypto to spy on allies and enemies alike.

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 6

Phil Stokes / February 7, 2020

Nintendo hacker gets taught a lesson by the FBI, IoT devices on Windows 7 hit by Lemon Duck malware and Huawei complain about "unconstitutional" FCC label.

Read More
MacOS Security Updates Part 3   Apples Whitelists Blacklists And Yara Rules 2
labs

macOS Security Updates Part 3 | Apple’s Whitelists, Blacklists and YARA Rules

Phil Stokes / February 3, 2020

Understanding macOS security tools is vital for researchers and defenders. With Apple's unique telemetry, they may hold the first clue to emerging threats.

Read More
Scripting Macs With Malice   How Shlayer And Other Malware Installers Infect MacOS 3
labs

Scripting Macs With Malice | How Shlayer and Other Malware Installers Infect macOS

Phil Stokes / January 29, 2020

Threat actors on macOS increasingly rely on shell scripts as an effective way to deliver malware installers that trick users and bypass security controls.

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 3

Phil Stokes / January 17, 2020

The cybersecurity skills shortage gets a much-needed boost, the NSA reveal a critical Windows Crypto bug, and researchers dump dangerous Citrix exploit code.

Read More
MacOS Security Updates Part 2   Running Diffs On Apple’s MRT App 11
labs

macOS Security Updates Part 2 | Running Diffs on Apple’s MRT app

Phil Stokes / January 15, 2020

Fighting malware on macOS? It'd help if we knew what Apple knew. Here we offer a tool and process to help keep up with changes to Malware Removal Tool.

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 2

Phil Stokes / January 10, 2020

Facebook initiates a ban on deepfakes, Mozilla rush out a patch for in-the-wild exploit and a US government-funded phone comes with preinstalled malware.

Read More
MacOS Security Updates Part 1   Discovering Changes To XProtect Friends 2
labs

macOS Security Updates Part 1 | Discovering Changes to XProtect & Friends

Phil Stokes / January 6, 2020

Threat hunting on macOS also means keeping up with Apple security updates. This post begins a series on how to parse these updates to discover new threats.

Read More
Previous
1 … 12 13 14 15 16 … 20
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.