SentinelLabs Logo RGB WhitePurp
ABOUT
CVE DATABASE
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Threat Researcher at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
Radare2 Power Ups Delivering Faster MacOS Malware Analysis With R2 Customization 5
labs
Security Research

Radare2 Power Ups | Delivering Faster macOS Malware Analysis With r2 Customization

Phil Stokes / May 31, 2023

Learn how to customize radare2 with user-defined aliases, macros and functions for faster and easier binary diffing and analysis.

Read More
sentinelone

Geacon Brings Cobalt Strike Capabilities to macOS Threat Actors

From the Front Lines, macOS | 6 minute read
Read More >
sentinelone

Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram

macOS | 16 minute read
Read More >
sentinelone

LockBit Ransomware: Protect Your macOS Today

From the Front Lines, macOS | 10 minute read
Read More >
sentinelone

Session Cookies, Keychains, SSH Keys and More | 7 Kinds of Data Malware Steals from macOS Users

macOS | 14 minute read
Read More >
sentinelone

Hunting for Honkbox | Multistage macOS Cryptominer May Still Be Hiding

macOS | 17 minute read
Read More >
sentinelone

macOS Payloads | 7 Prevalent and Emerging Obfuscation Techniques

macOS | 10 minute read
Read More >
sentinelone

7 Ways Threat Actors Deliver macOS Malware in the Enterprise

macOS | 18 minute read
Read More >
sentinelone

Top 10 macOS Malware Discoveries in 2022

macOS | 16 minute read
Read More >
sentinelone

V for Ventura | How Will Upgrading to macOS 13 Impact Organizations?

macOS | 10 minute read
Read More >
Previous
1 2 3 4 5 6 … 19
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
    Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
    June 9, 2025
  • FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    May 8, 2025
  • Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    April 28, 2025

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2025 SentinelOne, All Rights Reserved.