Thursday, March 20, 2025
HomeCyber Security NewsKali Linux 2025.1a Released: New Tools and Desktop Environment Upgrades

Kali Linux 2025.1a Released: New Tools and Desktop Environment Upgrades

Published on

SIEM as a Service

Follow Us on Google News

Kali Linux, the renowned cybersecurity-focused Linux distribution, has just ushered in the new year with the release of Kali Linux 2025.1a.

This update builds upon the existing features, offering myriad enhancements and improvements designed to give users a streamlined experience.

Whether you’re already a seasoned Kali user or about to dive into the world of ethical hacking, this release promises exciting new tools and significant desktop environment upgrades.

Key Updates in Kali Linux 2025.1a

Desktop Environment Updates

  1. KDE Plasma 6.2
    Kali Linux now comes equipped with KDE Plasma 6.2, marking a significant leap from the previous version 5.27. This update brings a fresh look to the desktop, including floating panels and a modern interface that enhances user interaction.
KDE Plasma 6.2
KDE Plasma 6.2
  1. Xfce 4.20
    For users who prefer the lightweight Xfce environment, Kali Linux 2025.1a offers a bump to version 4.20. This update, released on December 15, 2024, includes a host of minor improvements and stability enhancements.
Xfce 4.20
Xfce 4.20

New Keyboard Shortcuts

To enhance user experience, several new keyboard shortcuts have been added to Xfce. Some notable additions include:

  • File Manager: Ctrl + Alt + F, Super + E, and Super + F
  • Run Command: Super + R (in addition to the traditional Alt + F2)
  • Open Terminal: Super + T
  • Open Browser: Super + W
New Keyboard Shortcuts
New Keyboard Shortcuts

Window management shortcuts have also been expanded for easier handling in multi-monitor setups.

Raspberry Pi Enhancements

For Raspberry Pi users, Kali Linux 2025.1a introduces several significant changes:

  • New Kernel: Based on version 6.6.74 from the Raspberry Pi OS kernel, providing support for the Raspberry Pi 5.
  • Updated Firmware: Adoption of the raspi-firmware package, aligning with Raspberry Pi OS.
  • Partition Layout: Mirrors Raspberry Pi OS images with changes to the /boot/firmware directory.

Kali NetHunter Updates

Kali NetHunter, the smartphone version of Kali Linux, sees exciting developments:

  • CAN Arsenal: A new tab allows car hacking directly from your pocket, courtesy of V0lk3n.
  • New Kernels: Updated kernels for various Samsung and Xiaomi devices.
Kali NetHunter Updates
Kali NetHunter Updates

One of the highlights of this release is the inclusion of hoaxshell, a Windows reverse shell payload generator that exploits HTTP(S) protocols for a beacon-like reverse shell.

Website and Documentation

The Kali Linux website now hosts additional wallpaper pages showcasing themes from past versions and community contributions. Documentation has also been expanded with guides on configuring kernels for CAN and NetHunter-specific articles.

Getting Started with Kali Linux 2025.1a

Whether you’re upgrading an existing installation or downloading a fresh image, getting started with Kali Linux 2025.1a is straightforward:

Upgrading an Existing Install

If you already have Kali Linux installed, you can upgrade using the following commands:

echo "deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" | sudo tee /etc/apt/sources.list

sudo apt update && sudo apt -y full-upgrade

cp -vrbi /etc/skel/. ~/

[ -f /var/run/reboot-required ] && sudo reboot -f

For those looking for the latest builds or specific hardware support, Kali Linux provides weekly images in addition to the standard release images.

These images are perfect for users wanting the most recent packages and bug fixes without waiting for the next major release.

Kali Linux 2025.1a represents a significant step forward, blending security-focused tools with a modern, user-friendly interface.

With its enhancements in desktop environments, Raspberry Pi support, and NetHunter updates, this release is poised to be a favorite among cybersecurity professionals and enthusiasts alike.

Whether you’re diving into the world of ethical hacking or updating from a previous version, Kali Linux 2025.1a has something for everyone.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has...

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of...

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the...

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed "DollyWay," has been uncovered by GoDaddy Security researchers, revealing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has...

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of...

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the...