SentinelLabs Logo RGB WhitePurp
ABOUT
CVE DATABASE
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Research Engineer at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
sentinelone

macOS Security Updates Part 1 | Discovering Changes to XProtect & Friends

macOS | 11 minute read
Read More >
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 51

The Good, the Bad and the Ugly | 4 minute read
Read More >
sentinelone

MacOS Malware Outbreaks 2019 | The Second 6 Months

macOS | 9 minute read
Read More >
sentinelone

macOS Catalina 10.15.2 Update: What’s New

macOS | 7 minute read
Read More >
sentinelone

macOS Red Team: Calling Apple APIs Without Building Binaries

macOS | 17 minute read
Read More >
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 48

The Good, the Bad and the Ugly | 4 minute read
Read More >
sentinelone

macOS Red Team: Spoofing Privileged Helpers (and Others) to Gain Root

macOS | 12 minute read
Read More >
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 46

The Good, the Bad and the Ugly | 3 minute read
Read More >
sentinelone

Privilege Escalation | macOS Malware & The Path to Root Part 2

macOS | 13 minute read
Read More >
Privilege Escalation   MacOS Malware The Path To Root Part 1 1
labs
Security Research

Privilege Escalation | macOS Malware & The Path to Root Part 1

Phil Stokes / November 6, 2019

Researchers invest huge amounts of effort to uncover privilege escalations and develop exploits. What can we learn about macOS security from their work?

Read More
Previous
1 … 12 13 14 15 16 … 19
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware
    macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware
    July 2, 2025
  • Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
    Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
    June 9, 2025
  • FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    May 8, 2025

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2025 SentinelOne, All Rights Reserved.