OBTS v2.0: "Hypervisor-based Analysis of macOS Malware" - Felix Seele
OBTS v2.0: "Malware Behavior on macOS" - Thomas Reed
OBTS v2.0: "Fun with Mac Malware Attribution" (Josh Long)
Dissecting Rotten Apples – macOS Malware Analysis | Felix Seele | NULLCON Goa 2020
OBTS v2.0 "KeySteal: A Vulnerability in Apple's Keychain" - Linus Henze
OBTS v2.0: "Grafting Apple Trees" - Jaron Bradley
OBTS v2.0: "Never Before Had Stierlitz Been So Close To Failure" - Sergei Shevchenko
OBTS v2.0: "0dayz of our Life" - Josh Hill
Ghost Mach-O: an analysis of Lazarus’ Mac-malware innovations
OBTS v3.0: "Binary Emulation Environment for Mach-O Malware" - Erika Noerenberg
New macOS Malware Gimmick Discovered | Cyber Protection Operation Center News
The Faces Of MacOS Malware Detecting Anomalies In A Poisoned Apple by Amit Malik & Pratik Jeware
OBTS v2.0: "Watching the Watchers" - Sarah Edwards
macOS persistence, LaunchAgents and Beyond - BSides Portland 2022
#OBTS v5.0: "Sandboxing with ESF Playground on macOS" - Matt Carman
#OBTS v5.0: "Evolution of the Mac Threat Landscape" - Thomas Reed
#OBTS v6.0: "Modern macOS Threat Hunting" - Karl Hiramoto
OBTS v4.0: "Mac Detections by The Numbers" - Thomas Reed
DEF CON 26 - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls
Analysis of AppleJeus Malware by Lazarus Group