SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Research Engineer at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 42

Phil Stokes / October 18, 2019

US Cyber troops start hacking voting machines, a botnet turns its attention to sextortion and Samsung's fingerprint reader flops in the face of plastic.

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 41

Phil Stokes / October 11, 2019

California outlaws facial recognition body cams, Apple software vuln leads to Windows ransomware and Cupertino lands in hot water with China over Hong Kong.

Read More
MacOS Catalina   The Big Upgrade Dont Get Caught Out 2
labs

macOS Catalina | The Big Upgrade, Don’t Get Caught Out!

Phil Stokes / October 9, 2019

How ready is your organization for the huge changes in macOS Catalina? We outline the challenges enterprises may face with Apple's latest upgrade.

Read More
Checkm8   5 Things You Should Know About The New IOS Bootrom Exploit 6
labs

Checkm8: 5 Key Facts About the New iOS Boot ROM Exploit

Phil Stokes / September 30, 2019

Is your iOS device vulnerable to checkm8 vulnerability? What should you do if it is? Can malware defeat iPhone, iPad & Apple Watch security? Find out here.

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 39

Phil Stokes / September 27, 2019

US Government funds cybersecurity apprenticeships, one-click mobile exploits target iOS & Android users and here's a phishing URL to give you nightmares!

Read More
Detecting MacOS.GMERA Malware Through Behavioral Inspection 1
labs
Crimeware

Detecting macOS.GMERA Malware Through Behavioral Inspection

Phil Stokes / September 25, 2019

New malware hits macOS with well-worn techniques. Can behavioral detection prevent attacks that evade legacy AV and built-in Apple security?

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 37

Phil Stokes / September 13, 2019

Texas local governments successfully fight off ransomware attacks, there's a new kind of netCAT in town and Chrome OS leaks U2F private security keys.

Read More
MacOS Notarization  Security Hardening Or Security Theatre  1
labs

What is macOS Notarization? – An Easy Guide 101

Phil Stokes / September 11, 2019

Apple want developers to fight malware by adopting Notarization but what exactly is it, why is it controversial and why might it not slow down attackers?

Read More
MacOS Incident Response   Part 3  System Manipulation 1
labs
Security Research

macOS Incident Response | Part 3: System Manipulation

Phil Stokes / September 4, 2019

How can you detect system manipulations by malware, local or remote attackers on macOS? Find out in the final part of our series on macOS Incident Response.

Read More
Blog Weekly LinkedIn Alt
labs

The Good, the Bad and the Ugly in Cybersecurity – Week 35

Phil Stokes / August 30, 2019

French police take down a massive botnet, Google reveal multiple vulnerabilities in Apple's iOS and the US Gov't discloses details of an Iranian cyberattack.

Read More
Previous
1 … 14 15 16 17 18 … 20
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.