BLOGS
https://daringfireball.net
https://eclecticlight.co/category/macs/
https://osxdaily.com/
https://www.patentlyapple.com
https://slashdot.org/apple
PODCASTS
https://contextmachine.io
https://podcasts.apple.com/us/podcast/apple-context-machine/id107629726
https://twit.tv/shows/macbreak-weekly
https://macosken.squarespace.com/listen-up/
https://www.macvoices.com
https://www.youtube.com/@payetteforward/videos
https://twit.tv/shows/security-now
https://www.grc.com/securitynow.htm
THE ART OF MAC MALWARE
https://taomm.org/?mc_cid=bf37f3f750
Volume I: Analysis
Defenders must understand how malware works to counter
threats targeting Apple products. This volume explores
infection methods, persistence mechanisms, and
reverse-engineering techniques to analyze malicious code.
Volume II: Detection
Detecting malware is as vital as analyzing it. This volume
explores programmatic approaches to detecting malicious code
via behavioral heuristics, equipping you to develop tools
and techniques to neutralize macOS threats.
ChatGPT
https://chat.openai.com/chat