2025
Chaos: Charles Manson, the CIA, and the Secret History of the Sixties
This book was a wild ride. The first part really opened my eyes to the crimes of the Manson Family and the possible cover-ups that happened. It raises a lot of interesting questions, but by the end, there aren’t many clear answers. The story leaves you with a lot of mysteries and loose ends, and you have to accept that some things might never be explained. Overall, it’s an interesting read, but don’t expect a satisfying ending.
2024
Malware Development for Ethical Hackers by Zhassulan Zhussupov
This book serves as an excellent introduction to malware development for Windows OS. Unlike most online resources, it offers guidance on developing malware in a Linux environment using MinGW. Additionally, the book covers a range of techniques, including both lesser-known methods and those commonly found in real-world malware. Overall, it’s a valuable resource for anyone looking to delve deeper into malware development and understand the thought processes behind it.
Sun Eater: Demon in White by Christopher Ruocchio
“Demon in White”, the third book in the Sun Eater series, sees Hadrian Marlowe older, wiser, and deeply immersed in his quest to understand the events of Howling Dark. His journey to uncover the mysteries of “the quiet” is captivating, particularly the scenes where he climbs the mountain on Annica and learns about their true nature. As Hadrian grapples with visions of his future—either killing the Cielcin and sacrificing human lives or facing a reality where humanity loses the war—he realizes the immense power the quiet have given him, but also the dangers it poses. With the royal family increasingly wary of him and the stakes higher than ever, Hadrian’s survival is no guarantee, even as he prepares to defeat the Cielcin. The novel leaves us anxious about the fates of those close to him, especially Valka, and questioning the true cost of victory. “Demon in White” is a standout installment in a stellar series.
Sun Eater: Howling Dark by Christopher Ruocchio
“Empire of Silence” impressed me with its ambitious world-building and strong first-person narration, making Hadrian a flawed yet endearing character. While “Howling Dark” maintains this rich, lyrical style, I found the pacing slow in the first 200 pages due to prolonged character arguments. However, the book redeems itself with a fantastic climax, blending action with deep philosophical ideas. Despite the slower start, “Howling Dark” is a solid sequel that builds on the series, especially for those who enjoy epic sci-fi and intricate prose.
Sun Eater: Empire of Silence by Christopher Ruocchio
“Empire of Silence” is a great introduction to the Sun Eater world. The book covers the story of Hadrian but with a twist of the book being a recolection written by Hadrian himself. From the start, we learn that Hadrian is both revered as a hero who wiped out the Cielcin and reviled as a monster who destroyed a sun, killing billions. But these are just the end points. Hadrian wasn’t a hero, monster, or even a soldier—just a man on the wrong planet for the right reasons, beginning a path that leads to fire. And this book embodies this, the focus being the journey but not the destination.
Friendship is Optimal by Iceman
“Friendship is Optimal” is an amazing book that explores the intricacies of AI and its impact on our world if left unchecked. Despite its connection to the “My Little Pony” franchise, which is primarily for children, the book delves into complex and mature themes. It follows the creation of a revolutionary AI whose goal is to satisfy players’ values through friendship and ponies in a new My Little Pony-themed MMORPG. The book is short, easy to read, and thought-provoking, making it a highly recommended read in today’s age.
Eisenhorn: Hereticus by Dan Abnett
As the final book in the Eisenhorn trilogy, “Hereticus” had high expectations to meet, and in my opinion, it delivers the best of the series. It focuses heavily on character development and the consequences of previous actions. Unlike the previous book, the time skips in “Hereticus” have significant impact on the story and characters. Throughout the book, readers are consistently presented with moral dilemmas and introspection, leaving lingering questions even at the end. Overall, it’s an amazing ending and finale to the trilogy.
Eisenhorn: Malleus by Dan Abnett
In my opinion, “Malleus” is the most disappointing book of the trilogy. It attempts to continue the story of “Xenos” but is set years later. Despite this time jump, the characters show little development, and the mystery and plot feel repetitive. However, despite its shortcomings, the book introduces more interesting lore and serves as a stepping stone to the final installment.
Eisenhorn: Xenos by Dan Abnett
“Xenos” was my introduction to the Warhammer 40K universe. The Eisenhorn trilogy was recommended as an excellent entry point for newcomers. The story follows Inquisitor Gregor Eisenhorn tracking a chaos worshipper across the ice planet Hubris, seamlessly blending detective noir with grimdark fantasy. The writing is superb, and the gradual unveiling of the lore guides readers effectively. Overall, it’s a fantastic start to the universe and a promising beginning to the trilogy.
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems by Matt Hand
This book stands out as one of the best resources on evading EDR systems, offering thorough coverage of the topic while guiding the reader through every step. With detailed insights into EDR internals, it offers a fresh perspective on the subject matter. The concluding section presents a comprehensive attack scenario, meticulously justifying each action from initial access to exfiltration. Overall, it’s an exceptional read that I highly recommend.
2023
Surveillance State: China’s Quest to Launch a New Era of Social Control by Josh Chin & Liza Lin
This book provides an illuminating perspective on the complexities of the world, revealing that it is not always a simple matter of right or wrong. It offers an in-depth account of the evolution of surveillance across the globe and the influential entities that drive it. In summary, it is an exceptional book that presents an impartial assessment of the state of surveillance in the world.
The Blocksize War: The battle for control over Bitcoin’s protocol rules by Jonathan Bier
To be frank, I found this book somewhat underwhelming. While the subject matter was fascinating and timely, the writing style left something to be desired, and the author’s perspective seemed heavily influenced by their personal circumstances. Nevertheless, it remains a worthwhile read for gaining insight into the Blocksize war and the underlying principles that shaped it.
Project Hail Mary by Andy Weir
In my view, this book is one of the best fiction books I have read in recent times. I usually steer clear of dramatic books, but this one struck the perfect balance. The writing is superb, and the plot unfolds at a well-judged pace. I won’t delve into the details of the book, as I believe it’s best to read it without prior knowledge of the contents. Suffice it to say, it is a remarkable work that not only provides an engaging story but also prompts deeper contemplation of various topics.
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency by Andy Greenberg
The book encompasses a variety of narratives from both the surface and dark web that share a common theme of cryptocurrency. These stories are well-structured and chronologically arranged, offering insight into the early days of cryptocurrency as a currency for black markets and the efforts to regulate and trace this new unique form of currency. While some of the topics covered are heavy, the book is overall an excellent read and an informative journey through the history of the use of cryptocurrency for illegal activities.
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth
The book offers a unique perspective from a journalist who covers cybersecurity but is relegated to the outskirts of this shadowy field due to being a reporter. This perspective provides an excellent outside view of this niche area. Additionally, the book covers almost all of the major historical events related to cybersecurity (that we are aware of). It takes the reader on a journey from a position of having limited knowledge of the field to the end, where the curtains are pulled back, and the light shines on all the nefarious and secretive aspects. The book is quite comprehensive, but the content is written well. Furthermore, it makes the reader think at every turn, questioning what is right or wrong or whether they should be focusing on the salmon they are eating instead.
2022
Black Hat Go: Go Programming For Hackers and Pentesters by Tom Steele
Go is a fantastic language that, when paired with the right mindset and skills, can work wonders in network-based programs. This book empowers hackers to utilize this amazing programming language for cybersecurity. It is replete with examples and possibilities, demonstrating why Go is ideally suited for these examples. Additionally, the book provides the best approaches for each example, as well as the rationale behind them. Finally, the cherry on top is the final project, which enables readers to put all their newly acquired skills into practice by building a C2 RAT (Command and Control Remote Access Trojan). As this book is heavily exercise-based, I recommend readers follow along with their computers while reading and completing the examples. Overall, it is an excellent reference for the usage of Go in security.
Serious Cryptography: A Practical Introduction to Modern Encryption by Jean-Philippe Aumasson
My favorite book to date is exceptionally well-written, with perfect pacing and examples. Although cryptography is a complex and highly technical topic, the book gently guides readers from rudimentary cryptographic cyphers to the cutting-edge of the field. It is both a captivating read and an invaluable reference for my cryptography class. Anyone wishing to explore the world of cryptography and its nuances should definitely read this book.
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats by Alex Matrosov
The book is a technically dense read, but it is also exceptionally well-crafted with a balanced pacing. It delves extensively into the history of rootkits and bootkits while providing an up-to-date overview of their current state-of-the-art. Additionally, the book offers hands-on examples that are well-written, enabling readers to gain real-world experience in reversing rootkits and bootkits. While the book does provide good explanations, it is not intended for beginners due to the complexity of the subject matter. Nonetheless, it is an excellent resource for experienced reverse engineers and serves as a valuable reference for future endeavors.
2021
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers by Andy Greenberg
For those fascinated by the geopolitical aspect of information security, this book is a must-read. It offers a deep dive into the untold story of the Sandworm virus, shedding light on the clandestine forces that wield power in the world and the far-reaching impact of their decisions. The book is both compelling and eye-opening, providing a riveting account of history to complement the superb writing. In summary, it is an outstanding read that is sure to leave a lasting impression.