SentinelLabs Logo RGB WhitePurp
  • ABOUT
  • CVE DATABASE
  • CONTACT
  • VISIT SENTINELONE.COM
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Get a Demo
SentinelLabs Logo RGB WhitePurp
Navigation Arrow Left Back
Navigation Close
  • ABOUT
  • CVE DATABASE
  • CONTACT
  • VISIT SENTINELONE.COM
Get a Demo

Phil Stokes

Phil Stokes is a Threat Researcher at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
sentinelone

5 “Safe Computing” Practices for macOS and Why They Aren’t Enough

macOS | 6 minute read
Read More >
sentinelone

Mojave Security Can Be Bypassed With SSH Keygen Wrapper

macOS | 7 minute read
Read More >
sentinelone

On the Trail of OSX.FairyTale | Adware Playing at Malware

macOS | 7 minute read
Read More >
sentinelone

OSX.Fruitfly recycled | macOS still vulnerable to ‘old’ Perl script

macOS | 9 minute read
Read More >
sentinelone

Command Line Intrusion | Mojave Blocks Admins, Too

macOS | 8 minute read
Read More >
sentinelone

Automated macOS malware submissions “infecting” VirusTotal

macOS | 8 minute read
Read More >
sentinelone

We Nailed it! Calisto Detected installing Backdoor on macOS

macOS | 4 minute read
Read More >
sentinelone

The Weakest Link: When Admins Get Phished | MacOS “OSX.Dummy” Malware

macOS | 7 minute read
Read More >
Previous
1 … 14 15 16
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Latest Tweet

Could not authenticate you.

Recent Posts

  • Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit
    Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit
    September 21, 2023
  • Cyber Soft Power | China’s Continental Takeover
    Cyber Soft Power | China’s Continental Takeover
    September 21, 2023
  • CapraTube | Transparent Tribe’s CapraRAT Mimics YouTube to Hijack Android Phones
    CapraTube | Transparent Tribe’s CapraRAT Mimics YouTube to Hijack Android Phones
    September 18, 2023

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2023 SentinelOne, All Rights Reserved.