SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Research Engineer at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 51

Phil Stokes / December 20, 2019

Apple gifts security researchers a new bug bounty program, Emotet plays on Christmas cheer and Chinese location tracker leaks data from 47 million devices.

Read More
MacOS Malware Outbreaks 2019 The Second 6 Months 3
labs

MacOS Malware Outbreaks 2019 | The Second 6 Months

Phil Stokes / December 18, 2019

The second half of 2019 has seen increased APT attention on macOS, while commodity malware up their game and aggressiveness to counter detection efforts

Read More
MacOS Update   Whats New With Catalina 10.15.2  5
labs

macOS Catalina 10.15.2 Update: What’s New

Phil Stokes / December 12, 2019

Apple's latest update to Catalina brings bug fixes, security improvements and even some new features. We take a look at what's changed in macOS 10.15.2.

Read More
MacOS Red Team  Calling Apple APIs Without Building Binaries 7
labs

macOS Red Team: Calling Apple APIs Without Building Binaries

Phil Stokes / December 5, 2019

AppleScript is the PowerShell of macOS but with more power and less scrutiny. Red teamers can emulate fileless attacks, build fast scripts & call Apple APIs

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 48

Phil Stokes / November 29, 2019

Google tracks APTs and warns targeted users, thousands of CVE vulnerabilities go missing and Fortinet hands potential attackers hardcoded keys to encryption

Read More
MacOS Red Team 6
labs

macOS Red Team: Spoofing Privileged Helpers (and Others) to Gain Root

Phil Stokes / November 25, 2019

Effective social engineering is all about context. Red teamers can easily spoof trusted apps on a user's Mac with a little AppleScript magic and good timing

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 46

Phil Stokes / November 15, 2019

Tech giants join forces to improve safety of reusable code, Lizard Squad return with DDoS botnet attack & Windows Defender is defeated by a simple bypass.

Read More
Privilege Escalation   MacOS Malware The Path To Root Part 2 6
labs

Privilege Escalation | macOS Malware & The Path to Root Part 2

Phil Stokes / November 13, 2019

Vulnerabilities and exploits discovered by researchers are rarely used in the wild by macOS threat actors, who have found other, easier ways to the same end.

Read More
Privilege Escalation   MacOS Malware The Path To Root Part 1 1
labs
Security Research

Privilege Escalation | macOS Malware & The Path to Root Part 1

Phil Stokes / November 6, 2019

Researchers invest huge amounts of effort to uncover privilege escalations and develop exploits. What can we learn about macOS security from their work?

Read More
AdLoad MacOS Malware   How It Continues To Adapt Evade 1
labs
Security & Intelligence

How AdLoad macOS Malware Continues to Adapt & Evade

Phil Stokes / October 28, 2019

AdLoad adware evades Apple’s built-in protections, installs man-in-the-middle proxy & multiple persistence agents to thwart removal. Here’s how to fight it.

Read More
Previous
1 … 13 14 15 16 17 … 20
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.