SentinelLabs Logo RGB WhitePurp
ABOUT
CVE DATABASE
CONTACT
VISIT SENTINELONE.COM

Phil Stokes

Phil Stokes is a Threat Researcher at SentinelOne, specializing in macOS threat intelligence, platform vulnerabilities and malware analysis. He began his journey into macOS security as a software developer, creating end user troubleshooting and security tools just at the time when macOS adware and commodity malware first began appearing on the platform. Phil has been closely following the development of macOS threats as well as researching Mac software and OS vulnerabilities since 2014.
sentinelone

Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto

From the Front Lines | 5 minute read
Read More >
sentinelone

XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python

macOS | 10 minute read
Read More >
sentinelone

From the Front Lines | New macOS ‘covid’ Malware Masquerades as Apple, Wears Face of APT

From the Front Lines | 6 minute read
Read More >
sentinelone

Apple’s macOS Ventura | 7 New Security Changes to Be Aware Of

Company | 11 minute read
Read More >
Use Of Obfuscated Beacons In ‘pymafka Supply Chain Attack Signals A New Trend In MacOS Attack TTPs 1
labs
Security & Intelligence

Use of Obfuscated Beacons in ‘pymafka’ Supply Chain Attack Signals a New Trend in macOS Attack TTPs

Phil Stokes / May 25, 2022

A new typosquatting attack against the PyPI repository targets enterprise Macs with a distinctive obfuscation method.

Read More
The Art And Science Of MacOS Malware Hunting With Radare2 Leveraging Xrefs YARA Zignatures 11
labs
Security Research

The Art and Science of macOS Malware Hunting with radare2 | Leveraging Xrefs, YARA and Zignatures

Phil Stokes / March 21, 2022

In the next part of our series on reversing macOS malware, we dig into identifying reused code across malware samples for hunting and detection.

Read More
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 6

The Good, the Bad and the Ugly | 5 minute read
Read More >
sentinelone

10 Assumptions About macOS Security That Put Your Business At Risk

macOS | 17 minute read
Read More >
sentinelone

How SysJoker and DazzleSpy Malware Target macOS

macOS | 9 minute read
Read More >
sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 4

The Good, the Bad and the Ugly | 5 minute read
Read More >
Previous
1 … 3 4 5 6 7 … 19
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
    Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
    June 9, 2025
  • FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    May 8, 2025
  • Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    April 28, 2025

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2025 SentinelOne, All Rights Reserved.