No one here can perform the necessary forensics remotely, few with the time and tooling and skills are willing to perform forensics for free, no one here can evaluate the security risks that any one particular person might face, and no one here can provide advice past the usual reset-and-reload-and-lockdown.
Those with exploits worth millions aren’t prone to use those exploits freely, and—if your adversary here happens to have millions of dollars in exploits—then you’re still not going to get forensics assistance around here.
No one can prove that somebody is not hacked. And an investment in forensics expertise and time and tooling that provides a negative finding does not constitute proof, which means these efforts inherently involve infinite demand for finite resources.
Having had direct experience with more than a few folks with other unrelated issues that have claimed hacking, these discussions can and variously do go in directions entirely unrelated to digital security.
The easiest way to bulk-sort folks that might have gotten hacked from those that probably aren’t hacked are not the sorts of questions we can or should ask around here, and these same questions can be unwise to answer around here, too.
For the subset of folks reporting exploits that actually are exploited, yes, this particular reality is Not Fun.
Repeated questions do get repeated answers, yes.
As for finding more resources, I’ve repeatedly linked to the Apple Support document on this topic several times in this same thread.