Tuesday, April 22, 2025
HomeCyber Security NewsKali Linux 2025.1a Released: New Tools and Desktop Environment Upgrades

Kali Linux 2025.1a Released: New Tools and Desktop Environment Upgrades

Published on

SIEM as a Service

Follow Us on Google News

Kali Linux, the renowned cybersecurity-focused Linux distribution, has just ushered in the new year with the release of Kali Linux 2025.1a.

This update builds upon the existing features, offering myriad enhancements and improvements designed to give users a streamlined experience.

Whether you’re already a seasoned Kali user or about to dive into the world of ethical hacking, this release promises exciting new tools and significant desktop environment upgrades.

- Advertisement - Google News

Key Updates in Kali Linux 2025.1a

Desktop Environment Updates

  1. KDE Plasma 6.2
    Kali Linux now comes equipped with KDE Plasma 6.2, marking a significant leap from the previous version 5.27. This update brings a fresh look to the desktop, including floating panels and a modern interface that enhances user interaction.
KDE Plasma 6.2
KDE Plasma 6.2
  1. Xfce 4.20
    For users who prefer the lightweight Xfce environment, Kali Linux 2025.1a offers a bump to version 4.20. This update, released on December 15, 2024, includes a host of minor improvements and stability enhancements.
Xfce 4.20
Xfce 4.20

New Keyboard Shortcuts

To enhance user experience, several new keyboard shortcuts have been added to Xfce. Some notable additions include:

  • File Manager: Ctrl + Alt + F, Super + E, and Super + F
  • Run Command: Super + R (in addition to the traditional Alt + F2)
  • Open Terminal: Super + T
  • Open Browser: Super + W
New Keyboard Shortcuts
New Keyboard Shortcuts

Window management shortcuts have also been expanded for easier handling in multi-monitor setups.

Raspberry Pi Enhancements

For Raspberry Pi users, Kali Linux 2025.1a introduces several significant changes:

  • New Kernel: Based on version 6.6.74 from the Raspberry Pi OS kernel, providing support for the Raspberry Pi 5.
  • Updated Firmware: Adoption of the raspi-firmware package, aligning with Raspberry Pi OS.
  • Partition Layout: Mirrors Raspberry Pi OS images with changes to the /boot/firmware directory.

Kali NetHunter Updates

Kali NetHunter, the smartphone version of Kali Linux, sees exciting developments:

  • CAN Arsenal: A new tab allows car hacking directly from your pocket, courtesy of V0lk3n.
  • New Kernels: Updated kernels for various Samsung and Xiaomi devices.
Kali NetHunter Updates
Kali NetHunter Updates

One of the highlights of this release is the inclusion of hoaxshell, a Windows reverse shell payload generator that exploits HTTP(S) protocols for a beacon-like reverse shell.

Website and Documentation

The Kali Linux website now hosts additional wallpaper pages showcasing themes from past versions and community contributions. Documentation has also been expanded with guides on configuring kernels for CAN and NetHunter-specific articles.

Getting Started with Kali Linux 2025.1a

Whether you’re upgrading an existing installation or downloading a fresh image, getting started with Kali Linux 2025.1a is straightforward:

Upgrading an Existing Install

If you already have Kali Linux installed, you can upgrade using the following commands:

echo "deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" | sudo tee /etc/apt/sources.list

sudo apt update && sudo apt -y full-upgrade

cp -vrbi /etc/skel/. ~/

[ -f /var/run/reboot-required ] && sudo reboot -f

For those looking for the latest builds or specific hardware support, Kali Linux provides weekly images in addition to the standard release images.

These images are perfect for users wanting the most recent packages and bug fixes without waiting for the next major release.

Kali Linux 2025.1a represents a significant step forward, blending security-focused tools with a modern, user-friendly interface.

With its enhancements in desktop environments, Raspberry Pi support, and NetHunter updates, this release is poised to be a favorite among cybersecurity professionals and enthusiasts alike.

Whether you’re diving into the world of ethical hacking or updating from a previous version, Kali Linux 2025.1a has something for everyone.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...